From e01fb9b3d06ddd0afc128e9750b331f769413195 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Wed, 15 Jun 2022 07:42:50 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../appsmith/{2.0.5 => 2.0.6}/CHANGELOG.md | 18 +- .../appsmith/{2.0.5 => 2.0.6}/Chart.lock | 2 +- .../appsmith/{2.0.5 => 2.0.6}/Chart.yaml | 4 +- incubator/appsmith/{2.0.5 => 2.0.6}/README.md | 0 .../appsmith/{2.0.5 => 2.0.6}/app-readme.md | 0 .../charts/common-10.0.10.tgz | Bin .../{2.0.5 => 2.0.6}/charts/redis-3.0.7.tgz | Bin .../appsmith/{2.0.5 => 2.0.6}/ix_values.yaml | 2 +- .../appsmith/{2.0.5 => 2.0.6}/questions.yaml | 0 .../appsmith/{2.0.5 => 2.0.6}/security.md | 42 +- .../{2.0.5 => 2.0.6}/templates/common.yaml | 0 .../appsmith/{2.0.5 => 2.0.6}/values.yaml | 0 incubator/dashdot/0.0.1/CHANGELOG.md | 10 - incubator/dashdot/0.0.2/CHANGELOG.md | 18 + incubator/dashdot/{0.0.1 => 0.0.2}/Chart.lock | 2 +- incubator/dashdot/{0.0.1 => 0.0.2}/Chart.yaml | 4 +- incubator/dashdot/{0.0.1 => 0.0.2}/README.md | 0 .../dashdot/{0.0.1 => 0.0.2}/app-readme.md | 0 .../{0.0.1 => 0.0.2}/charts/common-10.0.9.tgz | Bin .../dashdot/{0.0.1 => 0.0.2}/ix_values.yaml | 2 +- .../dashdot/{0.0.1 => 0.0.2}/questions.yaml | 0 .../dashdot/{0.0.1 => 0.0.2}/security.md | 23 +- .../{0.0.1 => 0.0.2}/templates/common.yaml | 0 .../dashdot/{0.0.1 => 0.0.2}/values.yaml | 0 incubator/jump/0.0.1/CHANGELOG.md | 10 - incubator/jump/0.0.2/CHANGELOG.md | 18 + incubator/jump/{0.0.1 => 0.0.2}/Chart.lock | 2 +- incubator/jump/{0.0.1 => 0.0.2}/Chart.yaml | 2 +- incubator/jump/{0.0.1 => 0.0.2}/README.md | 0 incubator/jump/{0.0.1 => 0.0.2}/app-readme.md | 0 .../{0.0.1 => 0.0.2}/charts/common-10.0.9.tgz | Bin .../jump/{0.0.1 => 0.0.2}/ix_values.yaml | 2 +- .../jump/{0.0.1 => 0.0.2}/questions.yaml | 0 incubator/jump/{0.0.1 => 0.0.2}/security.md | 23 +- .../{0.0.1 => 0.0.2}/templates/common.yaml | 0 incubator/jump/{0.0.1 => 0.0.2}/values.yaml | 0 .../babybuddy/{8.0.4 => 8.0.5}/CHANGELOG.md | 18 +- stable/babybuddy/{8.0.4 => 8.0.5}/CONFIG.md | 0 .../4.0.3 => babybuddy/8.0.5}/Chart.lock | 2 +- stable/babybuddy/{8.0.4 => 8.0.5}/Chart.yaml | 4 +- stable/babybuddy/{8.0.4 => 8.0.5}/README.md | 0 .../babybuddy/{8.0.4 => 8.0.5}/app-readme.md | 0 .../charts/common-10.0.10.tgz | Bin .../charts/postgresql-8.0.7.tgz | Bin .../babybuddy/{8.0.4 => 8.0.5}/helm-values.md | 0 .../babybuddy/{8.0.4 => 8.0.5}/ix_values.yaml | 2 +- .../babybuddy/{8.0.4 => 8.0.5}/questions.yaml | 0 stable/babybuddy/{8.0.4 => 8.0.5}/security.md | 34 +- .../{8.0.4 => 8.0.5}/templates/common.yaml | 0 stable/babybuddy/{8.0.4 => 8.0.5}/values.yaml | 0 stable/budge/{2.0.4 => 2.0.5}/CHANGELOG.md | 18 +- stable/budge/{2.0.4 => 2.0.5}/CONFIG.md | 0 .../2.0.6 => budge/2.0.5}/Chart.lock | 2 +- stable/budge/{2.0.4 => 2.0.5}/Chart.yaml | 2 +- stable/budge/{2.0.4 => 2.0.5}/README.md | 0 stable/budge/{2.0.4 => 2.0.5}/app-readme.md | 0 .../charts/common-10.0.10.tgz | Bin stable/budge/{2.0.4 => 2.0.5}/helm-values.md | 0 stable/budge/{2.0.4 => 2.0.5}/ix_values.yaml | 2 +- stable/budge/{2.0.4 => 2.0.5}/questions.yaml | 0 stable/budge/{2.0.4 => 2.0.5}/security.md | 6 +- .../{2.0.4 => 2.0.5}/templates/common.yaml | 0 stable/budge/{2.0.4 => 2.0.5}/values.yaml | 0 stable/calibre-web/11.0.6/CHANGELOG.md | 99 + .../5.0.8 => calibre-web/11.0.6}/CONFIG.md | 0 .../5.0.8 => calibre-web/11.0.6}/Chart.lock | 2 +- stable/calibre-web/11.0.6/Chart.yaml | 31 + stable/calibre-web/11.0.6/README.md | 38 + stable/calibre-web/11.0.6/app-readme.md | 3 + .../11.0.6}/charts/common-10.0.10.tgz | Bin stable/calibre-web/11.0.6/helm-values.md | 26 + stable/calibre-web/11.0.6/ix_values.yaml | 24 + stable/calibre-web/11.0.6/questions.yaml | 2430 +++++++++++++++ stable/calibre-web/11.0.6/security.md | 242 ++ .../11.0.6}/templates/common.yaml | 0 .../5.0.8 => calibre-web/11.0.6}/values.yaml | 0 stable/custom-app/5.0.8/ix_values.yaml | 4 - .../custom-app/{5.0.8 => 5.0.9}/CHANGELOG.md | 18 +- .../2.0.4 => custom-app/5.0.9}/CONFIG.md | 0 .../2.0.4 => custom-app/5.0.9}/Chart.lock | 2 +- stable/custom-app/{5.0.8 => 5.0.9}/Chart.yaml | 4 +- stable/custom-app/{5.0.8 => 5.0.9}/README.md | 0 .../custom-app/{5.0.8 => 5.0.9}/app-readme.md | 0 .../5.0.9}/charts/common-10.0.10.tgz | Bin .../{5.0.8 => 5.0.9}/ci/test-values.yaml | 2 +- .../{5.0.8 => 5.0.9}/helm-values.md | 0 stable/custom-app/5.0.9/ix_values.yaml | 4 + .../{5.0.8 => 5.0.9}/questions.yaml | 0 .../custom-app/{5.0.8 => 5.0.9}/security.md | 32 +- .../5.0.9}/templates/common.yaml | 0 .../2.0.6 => custom-app/5.0.9}/values.yaml | 0 .../cyberchef/{2.0.6 => 2.0.7}/CHANGELOG.md | 18 +- .../2.0.4 => cyberchef/2.0.7}/Chart.lock | 2 +- stable/cyberchef/{2.0.6 => 2.0.7}/Chart.yaml | 2 +- stable/cyberchef/{2.0.6 => 2.0.7}/README.md | 0 .../cyberchef/{2.0.6 => 2.0.7}/app-readme.md | 0 .../2.0.7}/charts/common-10.0.10.tgz | Bin .../cyberchef/{2.0.6 => 2.0.7}/ix_values.yaml | 2 +- .../cyberchef/{2.0.6 => 2.0.7}/questions.yaml | 0 stable/cyberchef/{2.0.6 => 2.0.7}/security.md | 8 +- .../2.0.7}/templates/common.yaml | 0 .../2.0.4 => cyberchef/2.0.7}/values.yaml | 0 stable/ddns-go/{2.0.4 => 2.0.5}/CHANGELOG.md | 18 +- .../4.0.5 => ddns-go/2.0.5}/CONFIG.md | 0 stable/ddns-go/2.0.5/Chart.lock | 6 + stable/ddns-go/{2.0.4 => 2.0.5}/Chart.yaml | 4 +- stable/ddns-go/{2.0.4 => 2.0.5}/README.md | 0 stable/ddns-go/{2.0.4 => 2.0.5}/app-readme.md | 0 .../2.0.5}/charts/common-10.0.10.tgz | Bin .../ddns-go/{2.0.4 => 2.0.5}/helm-values.md | 0 .../ddns-go/{2.0.4 => 2.0.5}/ix_values.yaml | 2 +- .../ddns-go/{2.0.4 => 2.0.5}/questions.yaml | 0 stable/ddns-go/{2.0.4 => 2.0.5}/security.md | 8 +- .../2.0.5}/templates/common.yaml | 0 .../2.0.7 => ddns-go/2.0.5}/values.yaml | 0 stable/drawio/2.0.7/Chart.lock | 6 - stable/drawio/{2.0.7 => 2.0.8}/CHANGELOG.md | 18 +- stable/drawio/2.0.8/Chart.lock | 6 + stable/drawio/{2.0.7 => 2.0.8}/Chart.yaml | 4 +- stable/drawio/{2.0.7 => 2.0.8}/README.md | 0 stable/drawio/{2.0.7 => 2.0.8}/app-readme.md | 0 .../2.0.8}/charts/common-10.0.10.tgz | Bin stable/drawio/{2.0.7 => 2.0.8}/ix_values.yaml | 2 +- stable/drawio/{2.0.7 => 2.0.8}/questions.yaml | 0 stable/drawio/{2.0.7 => 2.0.8}/security.md | 36 +- .../2.0.8}/templates/common.yaml | 0 .../2.0.5 => drawio/2.0.8}/values.yaml | 0 stable/fileflows/2.0.5/Chart.lock | 6 - .../fileflows/{2.0.5 => 2.0.6}/CHANGELOG.md | 18 +- stable/fileflows/2.0.6/Chart.lock | 6 + stable/fileflows/{2.0.5 => 2.0.6}/Chart.yaml | 4 +- stable/fileflows/{2.0.5 => 2.0.6}/README.md | 0 .../fileflows/{2.0.5 => 2.0.6}/app-readme.md | 0 .../2.0.6}/charts/common-10.0.10.tgz | Bin .../fileflows/{2.0.5 => 2.0.6}/ix_values.yaml | 2 +- .../fileflows/{2.0.5 => 2.0.6}/questions.yaml | 0 stable/fileflows/{2.0.5 => 2.0.6}/security.md | 23 +- .../2.0.6}/templates/common.yaml | 0 .../4.0.5 => fileflows/2.0.6}/values.yaml | 0 .../friendica/{4.0.5 => 4.0.6}/CHANGELOG.md | 18 +- .../4.0.7 => friendica/4.0.6}/CONFIG.md | 0 stable/friendica/{4.0.5 => 4.0.6}/Chart.lock | 2 +- stable/friendica/{4.0.5 => 4.0.6}/Chart.yaml | 4 +- stable/friendica/{4.0.5 => 4.0.6}/README.md | 0 .../friendica/{4.0.5 => 4.0.6}/app-readme.md | 0 .../4.0.6}/charts/common-10.0.10.tgz | Bin .../{4.0.5 => 4.0.6}/charts/mariadb-3.0.7.tgz | Bin .../{4.0.5 => 4.0.6}/charts/redis-3.0.7.tgz | Bin .../friendica/{4.0.5 => 4.0.6}/helm-values.md | 0 .../friendica/{4.0.5 => 4.0.6}/ix_values.yaml | 2 +- .../friendica/{4.0.5 => 4.0.6}/questions.yaml | 0 stable/friendica/{4.0.5 => 4.0.6}/security.md | 92 +- .../{4.0.5 => 4.0.6}/templates/common.yaml | 0 .../4.0.7 => friendica/4.0.6}/values.yaml | 0 stable/grafana/4.0.7/Chart.lock | 6 - stable/grafana/{4.0.7 => 4.0.8}/CHANGELOG.md | 18 +- .../{homer/2.0.4 => grafana/4.0.8}/CONFIG.md | 0 stable/grafana/4.0.8/Chart.lock | 6 + stable/grafana/{4.0.7 => 4.0.8}/Chart.yaml | 4 +- stable/grafana/{4.0.7 => 4.0.8}/README.md | 0 stable/grafana/{4.0.7 => 4.0.8}/app-readme.md | 0 .../4.0.8}/charts/common-10.0.10.tgz | Bin .../grafana/{4.0.7 => 4.0.8}/helm-values.md | 0 .../grafana/{4.0.7 => 4.0.8}/ix_values.yaml | 2 +- .../grafana/{4.0.7 => 4.0.8}/questions.yaml | 0 stable/grafana/{4.0.7 => 4.0.8}/security.md | 36 +- .../4.0.8}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 .../2.0.4 => grafana/4.0.8}/values.yaml | 0 stable/home-assistant/15.0.6/CHANGELOG.md | 99 + .../2.0.6 => home-assistant/15.0.6}/CONFIG.md | 0 .../15.0.6}/Chart.lock | 2 +- stable/home-assistant/15.0.6/Chart.yaml | 34 + stable/home-assistant/15.0.6/README.md | 39 + stable/home-assistant/15.0.6/app-readme.md | 3 + .../15.0.6}/charts/common-10.0.10.tgz | Bin .../15.0.6}/charts/postgresql-8.0.7.tgz | Bin stable/home-assistant/15.0.6/helm-values.md | 36 + stable/home-assistant/15.0.6/ix_values.yaml | 164 ++ stable/home-assistant/15.0.6/questions.yaml | 2431 +++++++++++++++ stable/home-assistant/15.0.6/security.md | 452 +++ .../15.0.6/templates/common.yaml | 5 + .../15.0.6}/values.yaml | 0 stable/homer/2.0.4/Chart.lock | 6 - stable/homer/{2.0.4 => 2.0.5}/CHANGELOG.md | 18 +- .../6.0.6 => homer/2.0.5}/CONFIG.md | 0 stable/homer/2.0.5/Chart.lock | 6 + stable/homer/{2.0.4 => 2.0.5}/Chart.yaml | 4 +- stable/homer/{2.0.4 => 2.0.5}/README.md | 0 stable/homer/{2.0.4 => 2.0.5}/app-readme.md | 0 .../2.0.5}/charts/common-10.0.10.tgz | Bin stable/homer/{2.0.4 => 2.0.5}/helm-values.md | 0 stable/homer/{2.0.4 => 2.0.5}/ix_values.yaml | 2 +- stable/homer/{2.0.4 => 2.0.5}/questions.yaml | 0 stable/homer/{2.0.4 => 2.0.5}/security.md | 14 +- .../2.0.5}/templates/common.yaml | 0 .../6.0.6 => homer/2.0.5}/values.yaml | 0 stable/ispy-agent-dvr/2.0.6/Chart.lock | 6 - .../{2.0.6 => 2.0.7}/CHANGELOG.md | 18 +- .../4.0.6 => ispy-agent-dvr/2.0.7}/CONFIG.md | 0 stable/ispy-agent-dvr/2.0.7/Chart.lock | 6 + .../{2.0.6 => 2.0.7}/Chart.yaml | 4 +- .../ispy-agent-dvr/{2.0.6 => 2.0.7}/README.md | 0 .../{2.0.6 => 2.0.7}/app-readme.md | 0 .../2.0.7}/charts/common-10.0.10.tgz | Bin .../{2.0.6 => 2.0.7}/helm-values.md | 0 .../{2.0.6 => 2.0.7}/ix_values.yaml | 2 +- .../{2.0.6 => 2.0.7}/questions.yaml | 0 .../{2.0.6 => 2.0.7}/security.md | 74 +- .../2.0.7}/templates/common.yaml | 0 .../2.0.7}/values.yaml | 0 stable/jackett/11.0.9/CHANGELOG.md | 99 + .../6.0.8 => jackett/11.0.9}/CONFIG.md | 0 stable/jackett/11.0.9/Chart.lock | 6 + stable/jackett/11.0.9/Chart.yaml | 30 + stable/jackett/11.0.9/README.md | 37 + stable/jackett/11.0.9/app-readme.md | 3 + .../11.0.9}/charts/common-10.0.10.tgz | Bin stable/jackett/11.0.9/helm-values.md | 27 + stable/jackett/11.0.9/ix_values.yaml | 30 + stable/jackett/11.0.9/questions.yaml | 2439 +++++++++++++++ stable/jackett/11.0.9/security.md | 233 ++ .../11.0.9}/templates/common.yaml | 0 .../{n8n/4.0.6 => jackett/11.0.9}/values.yaml | 0 stable/littlelink/6.0.6/Chart.lock | 6 - .../littlelink/{6.0.6 => 6.0.7}/CHANGELOG.md | 18 +- .../4.0.7 => littlelink/6.0.7}/CONFIG.md | 0 stable/littlelink/6.0.7/Chart.lock | 6 + stable/littlelink/{6.0.6 => 6.0.7}/Chart.yaml | 2 +- stable/littlelink/{6.0.6 => 6.0.7}/README.md | 0 .../littlelink/{6.0.6 => 6.0.7}/app-readme.md | 0 .../6.0.7}/charts/common-10.0.10.tgz | Bin .../{6.0.6 => 6.0.7}/helm-values.md | 0 .../{6.0.6 => 6.0.7}/ix_values.yaml | 2 +- .../{6.0.6 => 6.0.7}/questions.yaml | 0 .../littlelink/{6.0.6 => 6.0.7}/security.md | 10 +- .../{6.0.6 => 6.0.7}/templates/_configmap.tpl | 0 .../{6.0.6 => 6.0.7}/templates/common.yaml | 0 .../3.0.4 => littlelink/6.0.7}/values.yaml | 0 .../mattermost/{3.0.4 => 3.0.5}/CHANGELOG.md | 18 +- .../8.0.4 => mattermost/3.0.5}/Chart.lock | 2 +- stable/mattermost/{3.0.4 => 3.0.5}/Chart.yaml | 2 +- stable/mattermost/{3.0.4 => 3.0.5}/README.md | 0 .../mattermost/{3.0.4 => 3.0.5}/app-readme.md | 0 .../3.0.5}/charts/common-10.0.10.tgz | Bin .../3.0.5}/charts/postgresql-8.0.7.tgz | Bin .../{3.0.4 => 3.0.5}/ix_values.yaml | 2 +- .../{3.0.4 => 3.0.5}/questions.yaml | 0 .../mattermost/{3.0.4 => 3.0.5}/security.md | 36 +- .../3.0.5}/templates/common.yaml | 0 .../6.0.8 => mattermost/3.0.5}/values.yaml | 0 stable/n8n/{4.0.6 => 4.0.7}/CHANGELOG.md | 18 +- stable/{rsshub/3.0.8 => n8n/4.0.7}/CONFIG.md | 0 stable/n8n/{4.0.6 => 4.0.7}/Chart.lock | 2 +- stable/n8n/{4.0.6 => 4.0.7}/Chart.yaml | 4 +- stable/n8n/{4.0.6 => 4.0.7}/README.md | 0 stable/n8n/{4.0.6 => 4.0.7}/app-readme.md | 0 .../4.0.7/charts/common-10.0.10.tgz | Bin .../4.0.7}/charts/postgresql-8.0.7.tgz | Bin .../{4.0.6 => 4.0.7}/charts/redis-3.0.7.tgz | Bin stable/n8n/{4.0.6 => 4.0.7}/helm-values.md | 0 stable/n8n/{4.0.6 => 4.0.7}/ix_values.yaml | 2 +- stable/n8n/{4.0.6 => 4.0.7}/questions.yaml | 0 stable/n8n/{4.0.6 => 4.0.7}/security.md | 0 .../{4.0.6 => 4.0.7}/templates/_configmap.tpl | 0 .../{4.0.6 => 4.0.7}/templates/common.yaml | 0 stable/{prometheus => n8n}/4.0.7/values.yaml | 0 stable/nocodb/{3.0.4 => 3.0.5}/CHANGELOG.md | 18 +- stable/nocodb/{3.0.4 => 3.0.5}/Chart.lock | 2 +- stable/nocodb/{3.0.4 => 3.0.5}/Chart.yaml | 4 +- stable/nocodb/{3.0.4 => 3.0.5}/README.md | 0 stable/nocodb/{3.0.4 => 3.0.5}/app-readme.md | 0 .../3.0.5}/charts/common-10.0.10.tgz | Bin .../3.0.5}/charts/postgresql-8.0.7.tgz | Bin .../{3.0.4 => 3.0.5}/charts/redis-3.0.7.tgz | Bin stable/nocodb/{3.0.4 => 3.0.5}/ix_values.yaml | 2 +- stable/nocodb/{3.0.4 => 3.0.5}/questions.yaml | 0 stable/nocodb/{3.0.4 => 3.0.5}/security.md | 52 +- .../{3.0.4 => 3.0.5}/templates/_configmap.tpl | 0 .../{3.0.4 => 3.0.5}/templates/_secrets.tpl | 0 .../{3.0.4 => 3.0.5}/templates/common.yaml | 0 .../3.0.8 => nocodb/3.0.5}/values.yaml | 0 stable/omada-controller/6.0.8/Chart.lock | 6 - .../{6.0.8 => 6.0.9}/CHANGELOG.md | 18 +- .../6.0.9}/CONFIG.md | 0 stable/omada-controller/6.0.9/Chart.lock | 6 + .../{6.0.8 => 6.0.9}/Chart.yaml | 2 +- .../{6.0.8 => 6.0.9}/README.md | 0 .../{6.0.8 => 6.0.9}/app-readme.md | 0 .../6.0.9}/charts/common-10.0.10.tgz | Bin .../{6.0.8 => 6.0.9}/helm-values.md | 0 .../{6.0.8 => 6.0.9}/ix_values.yaml | 2 +- .../{6.0.8 => 6.0.9}/questions.yaml | 0 .../{6.0.8 => 6.0.9}/security.md | 28 +- .../6.0.9}/templates/common.yaml | 0 .../6.0.9}/values.yaml | 0 stable/plex/10.0.5/CHANGELOG.md | 99 + .../2.0.4 => plex/10.0.5}/CONFIG.md | 0 stable/plex/10.0.5/Chart.lock | 6 + stable/plex/10.0.5/Chart.yaml | 28 + stable/plex/10.0.5/README.md | 37 + stable/plex/10.0.5/app-readme.md | 3 + .../10.0.5}/charts/common-10.0.10.tgz | Bin stable/plex/10.0.5/helm-values.md | 23 + stable/plex/10.0.5/ix_values.yaml | 20 + stable/plex/10.0.5/questions.yaml | 2459 ++++++++++++++++ stable/plex/10.0.5/security.md | 239 ++ .../10.0.5}/templates/common.yaml | 0 .../2.0.4 => plex/10.0.5}/values.yaml | 0 .../prometheus/{4.0.7 => 4.0.8}/CHANGELOG.md | 18 +- .../4.0.3 => prometheus/4.0.8}/CONFIG.md | 0 stable/prometheus/{4.0.7 => 4.0.8}/Chart.lock | 2 +- stable/prometheus/{4.0.7 => 4.0.8}/Chart.yaml | 2 +- stable/prometheus/{4.0.7 => 4.0.8}/README.md | 0 .../prometheus/{4.0.7 => 4.0.8}/app-readme.md | 0 .../4.0.8}/charts/common-10.0.10.tgz | Bin .../charts/kube-state-metrics-3.1.0.tgz | Bin .../charts/node-exporter-3.0.3.tgz | Bin .../crds/crd-alertmanager-config.yaml | 0 .../crds/crd-alertmanager.yaml | 0 .../{4.0.7 => 4.0.8}/crds/crd-podmonitor.yaml | 0 .../{4.0.7 => 4.0.8}/crds/crd-probes.yaml | 0 .../{4.0.7 => 4.0.8}/crds/crd-prometheus.yaml | 0 .../crds/crd-prometheusrules.yaml | 0 .../crds/crd-servicemonitor.yaml | 0 .../crds/crd-thanosrulers.yaml | 0 .../{4.0.7 => 4.0.8}/helm-values.md | 0 .../{4.0.7 => 4.0.8}/ix_values.yaml | 2 +- .../{4.0.7 => 4.0.8}/questions.yaml | 0 .../prometheus/{4.0.7 => 4.0.8}/security.md | 52 +- .../{4.0.7 => 4.0.8}/templates/_helpers.tpl | 0 .../templates/alertmanager/_alertmanager.tpl | 0 .../templates/alertmanager/secrets.yaml | 0 .../alertmanager/serviceaccount.yaml | 0 .../alertmanager/servicemonitor.yaml | 0 .../{4.0.7 => 4.0.8}/templates/common.yaml | 0 .../templates/exporters/core-dns/service.yaml | 0 .../exporters/core-dns/servicemonitor.yaml | 0 .../kube-apiserver/servicemonitor.yaml | 0 .../kube-controller-manager/endpoints.yaml | 0 .../kube-controller-manager/service.yaml | 0 .../servicemonitor.yaml | 0 .../exporters/kube-scheduler/endpoints.yaml | 0 .../exporters/kube-scheduler/service.yaml | 0 .../kube-scheduler/servicemonitor.yaml | 0 .../exporters/kubelet/servicemonitor.yaml | 0 .../templates/operator/_args.tpl | 0 .../templates/operator/configmap.yaml | 0 .../templates/operator/servicemonitor.yaml | 0 .../prometheus/_additionalPrometheusRules.tpl | 0 .../prometheus/_additionalScrapeJobs.tpl | 0 .../templates/prometheus/_prometheus.tpl | 0 .../templates/prometheus/_servicemonitor.tpl | 0 .../templates/prometheus/clusterrole.yaml | 0 .../prometheus/clusterrolebinding.yaml | 0 .../templates/prometheus/serviceaccount.yaml | 0 .../4.0.3 => prometheus/4.0.8}/values.yaml | 0 stable/rsshub/{3.0.8 => 3.0.9}/CHANGELOG.md | 18 +- .../5.0.1 => rsshub/3.0.9}/CONFIG.md | 0 stable/rsshub/{3.0.8 => 3.0.9}/Chart.lock | 2 +- stable/rsshub/{3.0.8 => 3.0.9}/Chart.yaml | 2 +- stable/rsshub/{3.0.8 => 3.0.9}/README.md | 0 stable/rsshub/{3.0.8 => 3.0.9}/app-readme.md | 0 .../3.0.9}/charts/common-10.0.10.tgz | Bin .../{3.0.8 => 3.0.9}/charts/redis-3.0.7.tgz | Bin stable/rsshub/{3.0.8 => 3.0.9}/helm-values.md | 0 stable/rsshub/{3.0.8 => 3.0.9}/ix_values.yaml | 2 +- stable/rsshub/{3.0.8 => 3.0.9}/questions.yaml | 0 stable/rsshub/{3.0.8 => 3.0.9}/security.md | 32 +- stable/rsshub/3.0.9/templates/common.yaml | 1 + .../5.0.1 => rsshub/3.0.9}/values.yaml | 0 stable/snipe-it/{4.0.4 => 4.0.5}/CHANGELOG.md | 18 +- stable/snipe-it/4.0.5/CONFIG.md | 7 + stable/snipe-it/{4.0.4 => 4.0.5}/Chart.lock | 2 +- stable/snipe-it/{4.0.4 => 4.0.5}/Chart.yaml | 4 +- stable/snipe-it/{4.0.4 => 4.0.5}/README.md | 0 .../snipe-it/{4.0.4 => 4.0.5}/app-readme.md | 0 .../snipe-it/4.0.5/charts/common-10.0.10.tgz | Bin 0 -> 46486 bytes .../{4.0.4 => 4.0.5}/charts/mariadb-3.0.7.tgz | Bin .../{4.0.4 => 4.0.5}/charts/redis-3.0.7.tgz | Bin .../snipe-it/{4.0.4 => 4.0.5}/helm-values.md | 0 .../snipe-it/{4.0.4 => 4.0.5}/ix_values.yaml | 2 +- .../snipe-it/{4.0.4 => 4.0.5}/questions.yaml | 0 stable/snipe-it/{4.0.4 => 4.0.5}/security.md | 260 +- .../{4.0.4 => 4.0.5}/templates/_secrets.tpl | 0 .../{4.0.4 => 4.0.5}/templates/common.yaml | 0 .../4.0.5/values.yaml} | 0 stable/storj-node/2.0.4/Chart.lock | 6 - .../storj-node/{2.0.4 => 2.0.5}/CHANGELOG.md | 18 +- stable/storj-node/2.0.5/CONFIG.md | 7 + stable/storj-node/2.0.5/Chart.lock | 6 + stable/storj-node/{2.0.4 => 2.0.5}/Chart.yaml | 4 +- stable/storj-node/{2.0.4 => 2.0.5}/README.md | 0 stable/storj-node/2.0.5/SKIPINSTALL | 0 .../storj-node/{2.0.4 => 2.0.5}/app-readme.md | 0 .../2.0.5/charts/common-10.0.10.tgz | Bin 0 -> 46486 bytes .../{2.0.4 => 2.0.5}/helm-values.md | 0 .../{2.0.4 => 2.0.5}/ix_values.yaml | 2 +- .../{2.0.4 => 2.0.5}/questions.yaml | 0 .../storj-node/{2.0.4 => 2.0.5}/security.md | 24 +- stable/storj-node/2.0.5/templates/common.yaml | 1 + stable/storj-node/2.0.5/values.yaml | 0 stable/synapse/{4.0.3 => 4.0.4}/CHANGELOG.md | 18 +- stable/synapse/4.0.4/CONFIG.md | 7 + stable/synapse/4.0.4/Chart.lock | 9 + stable/synapse/{4.0.3 => 4.0.4}/Chart.yaml | 4 +- stable/synapse/{4.0.3 => 4.0.4}/README.md | 0 stable/synapse/{4.0.3 => 4.0.4}/app-readme.md | 0 .../synapse/4.0.4/charts/common-10.0.10.tgz | Bin 0 -> 46486 bytes .../synapse/4.0.4/charts/postgresql-8.0.7.tgz | Bin 0 -> 76855 bytes .../{4.0.3 => 4.0.4}/ci/base-values.yaml | 0 .../{4.0.3 => 4.0.4}/ci/basic-values.yaml | 0 .../synapse/{4.0.3 => 4.0.4}/helm-values.md | 0 .../synapse/{4.0.3 => 4.0.4}/ix_values.yaml | 2 +- .../synapse/{4.0.3 => 4.0.4}/questions.yaml | 0 stable/synapse/{4.0.3 => 4.0.4}/security.md | 0 .../{4.0.3 => 4.0.4}/templates/_configmap.tpl | 0 .../{4.0.3 => 4.0.4}/templates/_helpers.tpl | 0 .../{4.0.3 => 4.0.4}/templates/_secret.tpl | 0 .../{4.0.3 => 4.0.4}/templates/common.yaml | 0 stable/synapse/4.0.4/values.yaml | 0 stable/traefik/12.0.5/CHANGELOG.md | 99 + stable/traefik/12.0.5/CONFIG.md | 7 + stable/traefik/12.0.5/Chart.lock | 6 + stable/traefik/12.0.5/Chart.yaml | 30 + stable/traefik/12.0.5/README.md | 39 + stable/traefik/12.0.5/app-readme.md | 3 + .../traefik/12.0.5/charts/common-10.0.10.tgz | Bin 0 -> 46486 bytes stable/traefik/12.0.5/crds/ingressroute.yaml | 198 ++ .../traefik/12.0.5/crds/ingressroutetcp.yaml | 160 + .../traefik/12.0.5/crds/ingressrouteudp.yaml | 84 + stable/traefik/12.0.5/crds/middlewares.yaml | 563 ++++ .../traefik/12.0.5/crds/middlewarestcp.yaml | 59 + .../12.0.5/crds/serverstransports.yaml | 101 + stable/traefik/12.0.5/crds/tlsoptions.yaml | 87 + stable/traefik/12.0.5/crds/tlsstores.yaml | 64 + .../traefik/12.0.5/crds/traefikservices.yaml | 270 ++ stable/traefik/12.0.5/helm-values.md | 55 + stable/traefik/12.0.5/ix_values.yaml | 338 +++ stable/traefik/12.0.5/questions.yaml | 2614 +++++++++++++++++ stable/traefik/12.0.5/security.md | 106 + stable/traefik/12.0.5/templates/_args.tpl | 155 + stable/traefik/12.0.5/templates/_helpers.tpl | 22 + .../12.0.5/templates/_ingressclass.tpl | 24 + .../12.0.5/templates/_ingressroute.tpl | 25 + .../traefik/12.0.5/templates/_portalhook.tpl | 26 + .../traefik/12.0.5/templates/_tlsoptions.tpl | 12 + stable/traefik/12.0.5/templates/common.yaml | 24 + .../middlewares/basic-middleware.yaml | 65 + .../templates/middlewares/basicauth.yaml | 34 + .../12.0.5/templates/middlewares/chain.yaml | 21 + .../templates/middlewares/forwardauth.yaml | 30 + .../templates/middlewares/ipwhitelist.yaml | 33 + .../templates/middlewares/ratelimit.yaml | 19 + .../templates/middlewares/redirectScheme.yaml | 19 + .../templates/middlewares/redirectregex.yaml | 20 + .../middlewares/stripPrefixRegex.yaml | 20 + .../templates/middlewares/tc-chains.yaml | 29 + .../templates/middlewares/tc-headers.yaml | 64 + .../templates/middlewares/tc-nextcloud.yaml | 25 + stable/traefik/12.0.5/values.yaml | 0 stable/trilium-notes/5.0.1/Chart.lock | 6 - .../{5.0.1 => 5.0.2}/CHANGELOG.md | 18 +- stable/trilium-notes/5.0.2/CONFIG.md | 7 + stable/trilium-notes/5.0.2/Chart.lock | 6 + .../trilium-notes/{5.0.1 => 5.0.2}/Chart.yaml | 4 +- .../trilium-notes/{5.0.1 => 5.0.2}/README.md | 0 .../{5.0.1 => 5.0.2}/app-readme.md | 0 .../5.0.2/charts/common-10.0.10.tgz | Bin 0 -> 46486 bytes .../{5.0.1 => 5.0.2}/helm-values.md | 0 .../{5.0.1 => 5.0.2}/ix_values.yaml | 2 +- .../{5.0.1 => 5.0.2}/questions.yaml | 0 .../{5.0.1 => 5.0.2}/security.md | 10 +- .../trilium-notes/5.0.2/templates/common.yaml | 1 + stable/trilium-notes/5.0.2/values.yaml | 0 476 files changed, 18408 insertions(+), 869 deletions(-) rename incubator/appsmith/{2.0.5 => 2.0.6}/CHANGELOG.md (91%) rename incubator/appsmith/{2.0.5 => 2.0.6}/Chart.lock (85%) rename incubator/appsmith/{2.0.5 => 2.0.6}/Chart.yaml (96%) rename incubator/appsmith/{2.0.5 => 2.0.6}/README.md (100%) rename incubator/appsmith/{2.0.5 => 2.0.6}/app-readme.md (100%) rename incubator/appsmith/{2.0.5 => 2.0.6}/charts/common-10.0.10.tgz (100%) rename incubator/appsmith/{2.0.5 => 2.0.6}/charts/redis-3.0.7.tgz (100%) rename incubator/appsmith/{2.0.5 => 2.0.6}/ix_values.yaml (90%) rename incubator/appsmith/{2.0.5 => 2.0.6}/questions.yaml (100%) rename incubator/appsmith/{2.0.5 => 2.0.6}/security.md (99%) rename incubator/appsmith/{2.0.5 => 2.0.6}/templates/common.yaml (100%) rename incubator/appsmith/{2.0.5 => 2.0.6}/values.yaml (100%) delete mode 100644 incubator/dashdot/0.0.1/CHANGELOG.md create mode 100644 incubator/dashdot/0.0.2/CHANGELOG.md rename incubator/dashdot/{0.0.1 => 0.0.2}/Chart.lock (80%) rename incubator/dashdot/{0.0.1 => 0.0.2}/Chart.yaml (95%) rename incubator/dashdot/{0.0.1 => 0.0.2}/README.md (100%) rename incubator/dashdot/{0.0.1 => 0.0.2}/app-readme.md (100%) rename incubator/dashdot/{0.0.1 => 0.0.2}/charts/common-10.0.9.tgz (100%) rename incubator/dashdot/{0.0.1 => 0.0.2}/ix_values.yaml (91%) rename incubator/dashdot/{0.0.1 => 0.0.2}/questions.yaml (100%) rename incubator/dashdot/{0.0.1 => 0.0.2}/security.md (98%) rename incubator/dashdot/{0.0.1 => 0.0.2}/templates/common.yaml (100%) rename incubator/dashdot/{0.0.1 => 0.0.2}/values.yaml (100%) delete mode 100644 incubator/jump/0.0.1/CHANGELOG.md create mode 100644 incubator/jump/0.0.2/CHANGELOG.md rename incubator/jump/{0.0.1 => 0.0.2}/Chart.lock (80%) rename incubator/jump/{0.0.1 => 0.0.2}/Chart.yaml (98%) rename incubator/jump/{0.0.1 => 0.0.2}/README.md (100%) rename incubator/jump/{0.0.1 => 0.0.2}/app-readme.md (100%) rename incubator/jump/{0.0.1 => 0.0.2}/charts/common-10.0.9.tgz (100%) rename incubator/jump/{0.0.1 => 0.0.2}/ix_values.yaml (84%) rename incubator/jump/{0.0.1 => 0.0.2}/questions.yaml (100%) rename incubator/jump/{0.0.1 => 0.0.2}/security.md (92%) rename incubator/jump/{0.0.1 => 0.0.2}/templates/common.yaml (100%) rename incubator/jump/{0.0.1 => 0.0.2}/values.yaml (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/CHANGELOG.md (90%) rename stable/babybuddy/{8.0.4 => 8.0.5}/CONFIG.md (100%) rename stable/{synapse/4.0.3 => babybuddy/8.0.5}/Chart.lock (85%) rename stable/babybuddy/{8.0.4 => 8.0.5}/Chart.yaml (96%) rename stable/babybuddy/{8.0.4 => 8.0.5}/README.md (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/app-readme.md (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/charts/common-10.0.10.tgz (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/charts/postgresql-8.0.7.tgz (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/helm-values.md (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/ix_values.yaml (90%) rename stable/babybuddy/{8.0.4 => 8.0.5}/questions.yaml (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/security.md (99%) rename stable/babybuddy/{8.0.4 => 8.0.5}/templates/common.yaml (100%) rename stable/babybuddy/{8.0.4 => 8.0.5}/values.yaml (100%) rename stable/budge/{2.0.4 => 2.0.5}/CHANGELOG.md (90%) rename stable/budge/{2.0.4 => 2.0.5}/CONFIG.md (100%) rename stable/{cyberchef/2.0.6 => budge/2.0.5}/Chart.lock (80%) rename stable/budge/{2.0.4 => 2.0.5}/Chart.yaml (97%) rename stable/budge/{2.0.4 => 2.0.5}/README.md (100%) rename stable/budge/{2.0.4 => 2.0.5}/app-readme.md (100%) rename stable/budge/{2.0.4 => 2.0.5}/charts/common-10.0.10.tgz (100%) rename stable/budge/{2.0.4 => 2.0.5}/helm-values.md (100%) rename stable/budge/{2.0.4 => 2.0.5}/ix_values.yaml (82%) rename stable/budge/{2.0.4 => 2.0.5}/questions.yaml (100%) rename stable/budge/{2.0.4 => 2.0.5}/security.md (98%) rename stable/budge/{2.0.4 => 2.0.5}/templates/common.yaml (100%) rename stable/budge/{2.0.4 => 2.0.5}/values.yaml (100%) create mode 100644 stable/calibre-web/11.0.6/CHANGELOG.md rename stable/{custom-app/5.0.8 => calibre-web/11.0.6}/CONFIG.md (100%) rename stable/{custom-app/5.0.8 => calibre-web/11.0.6}/Chart.lock (80%) create mode 100644 stable/calibre-web/11.0.6/Chart.yaml create mode 100644 stable/calibre-web/11.0.6/README.md create mode 100644 stable/calibre-web/11.0.6/app-readme.md rename stable/{custom-app/5.0.8 => calibre-web/11.0.6}/charts/common-10.0.10.tgz (100%) create mode 100644 stable/calibre-web/11.0.6/helm-values.md create mode 100644 stable/calibre-web/11.0.6/ix_values.yaml create mode 100644 stable/calibre-web/11.0.6/questions.yaml create mode 100644 stable/calibre-web/11.0.6/security.md rename stable/{custom-app/5.0.8 => calibre-web/11.0.6}/templates/common.yaml (100%) rename stable/{custom-app/5.0.8 => calibre-web/11.0.6}/values.yaml (100%) delete mode 100644 stable/custom-app/5.0.8/ix_values.yaml rename stable/custom-app/{5.0.8 => 5.0.9}/CHANGELOG.md (91%) rename stable/{ddns-go/2.0.4 => custom-app/5.0.9}/CONFIG.md (100%) rename stable/{ddns-go/2.0.4 => custom-app/5.0.9}/Chart.lock (80%) rename stable/custom-app/{5.0.8 => 5.0.9}/Chart.yaml (94%) rename stable/custom-app/{5.0.8 => 5.0.9}/README.md (100%) rename stable/custom-app/{5.0.8 => 5.0.9}/app-readme.md (100%) rename stable/{cyberchef/2.0.6 => custom-app/5.0.9}/charts/common-10.0.10.tgz (100%) rename stable/custom-app/{5.0.8 => 5.0.9}/ci/test-values.yaml (87%) rename stable/custom-app/{5.0.8 => 5.0.9}/helm-values.md (100%) create mode 100644 stable/custom-app/5.0.9/ix_values.yaml rename stable/custom-app/{5.0.8 => 5.0.9}/questions.yaml (100%) rename stable/custom-app/{5.0.8 => 5.0.9}/security.md (98%) rename stable/{cyberchef/2.0.6 => custom-app/5.0.9}/templates/common.yaml (100%) rename stable/{cyberchef/2.0.6 => custom-app/5.0.9}/values.yaml (100%) rename stable/cyberchef/{2.0.6 => 2.0.7}/CHANGELOG.md (91%) rename stable/{budge/2.0.4 => cyberchef/2.0.7}/Chart.lock (80%) rename stable/cyberchef/{2.0.6 => 2.0.7}/Chart.yaml (98%) rename stable/cyberchef/{2.0.6 => 2.0.7}/README.md (100%) rename stable/cyberchef/{2.0.6 => 2.0.7}/app-readme.md (100%) rename stable/{ddns-go/2.0.4 => cyberchef/2.0.7}/charts/common-10.0.10.tgz (100%) rename stable/cyberchef/{2.0.6 => 2.0.7}/ix_values.yaml (76%) rename stable/cyberchef/{2.0.6 => 2.0.7}/questions.yaml (100%) rename stable/cyberchef/{2.0.6 => 2.0.7}/security.md (96%) rename stable/{ddns-go/2.0.4 => cyberchef/2.0.7}/templates/common.yaml (100%) rename stable/{ddns-go/2.0.4 => cyberchef/2.0.7}/values.yaml (100%) rename stable/ddns-go/{2.0.4 => 2.0.5}/CHANGELOG.md (91%) rename stable/{friendica/4.0.5 => ddns-go/2.0.5}/CONFIG.md (100%) create mode 100644 stable/ddns-go/2.0.5/Chart.lock rename stable/ddns-go/{2.0.4 => 2.0.5}/Chart.yaml (95%) rename stable/ddns-go/{2.0.4 => 2.0.5}/README.md (100%) rename stable/ddns-go/{2.0.4 => 2.0.5}/app-readme.md (100%) rename stable/{drawio/2.0.7 => ddns-go/2.0.5}/charts/common-10.0.10.tgz (100%) rename stable/ddns-go/{2.0.4 => 2.0.5}/helm-values.md (100%) rename stable/ddns-go/{2.0.4 => 2.0.5}/ix_values.yaml (80%) rename stable/ddns-go/{2.0.4 => 2.0.5}/questions.yaml (100%) rename stable/ddns-go/{2.0.4 => 2.0.5}/security.md (96%) rename stable/{drawio/2.0.7 => ddns-go/2.0.5}/templates/common.yaml (100%) rename stable/{drawio/2.0.7 => ddns-go/2.0.5}/values.yaml (100%) delete mode 100644 stable/drawio/2.0.7/Chart.lock rename stable/drawio/{2.0.7 => 2.0.8}/CHANGELOG.md (91%) create mode 100644 stable/drawio/2.0.8/Chart.lock rename stable/drawio/{2.0.7 => 2.0.8}/Chart.yaml (94%) rename stable/drawio/{2.0.7 => 2.0.8}/README.md (100%) rename stable/drawio/{2.0.7 => 2.0.8}/app-readme.md (100%) rename stable/{fileflows/2.0.5 => drawio/2.0.8}/charts/common-10.0.10.tgz (100%) rename stable/drawio/{2.0.7 => 2.0.8}/ix_values.yaml (76%) rename stable/drawio/{2.0.7 => 2.0.8}/questions.yaml (100%) rename stable/drawio/{2.0.7 => 2.0.8}/security.md (96%) rename stable/{fileflows/2.0.5 => drawio/2.0.8}/templates/common.yaml (100%) rename stable/{fileflows/2.0.5 => drawio/2.0.8}/values.yaml (100%) delete mode 100644 stable/fileflows/2.0.5/Chart.lock rename stable/fileflows/{2.0.5 => 2.0.6}/CHANGELOG.md (90%) create mode 100644 stable/fileflows/2.0.6/Chart.lock rename stable/fileflows/{2.0.5 => 2.0.6}/Chart.yaml (95%) rename stable/fileflows/{2.0.5 => 2.0.6}/README.md (100%) rename stable/fileflows/{2.0.5 => 2.0.6}/app-readme.md (100%) rename stable/{friendica/4.0.5 => fileflows/2.0.6}/charts/common-10.0.10.tgz (100%) rename stable/fileflows/{2.0.5 => 2.0.6}/ix_values.yaml (85%) rename stable/fileflows/{2.0.5 => 2.0.6}/questions.yaml (100%) rename stable/fileflows/{2.0.5 => 2.0.6}/security.md (95%) rename stable/{grafana/4.0.7 => fileflows/2.0.6}/templates/common.yaml (100%) rename stable/{friendica/4.0.5 => fileflows/2.0.6}/values.yaml (100%) rename stable/friendica/{4.0.5 => 4.0.6}/CHANGELOG.md (90%) rename stable/{grafana/4.0.7 => friendica/4.0.6}/CONFIG.md (100%) rename stable/friendica/{4.0.5 => 4.0.6}/Chart.lock (88%) rename stable/friendica/{4.0.5 => 4.0.6}/Chart.yaml (95%) rename stable/friendica/{4.0.5 => 4.0.6}/README.md (100%) rename stable/friendica/{4.0.5 => 4.0.6}/app-readme.md (100%) rename stable/{grafana/4.0.7 => friendica/4.0.6}/charts/common-10.0.10.tgz (100%) rename stable/friendica/{4.0.5 => 4.0.6}/charts/mariadb-3.0.7.tgz (100%) rename stable/friendica/{4.0.5 => 4.0.6}/charts/redis-3.0.7.tgz (100%) rename stable/friendica/{4.0.5 => 4.0.6}/helm-values.md (100%) rename stable/friendica/{4.0.5 => 4.0.6}/ix_values.yaml (94%) rename stable/friendica/{4.0.5 => 4.0.6}/questions.yaml (100%) rename stable/friendica/{4.0.5 => 4.0.6}/security.md (99%) rename stable/friendica/{4.0.5 => 4.0.6}/templates/common.yaml (100%) rename stable/{grafana/4.0.7 => friendica/4.0.6}/values.yaml (100%) delete mode 100644 stable/grafana/4.0.7/Chart.lock rename stable/grafana/{4.0.7 => 4.0.8}/CHANGELOG.md (91%) rename stable/{homer/2.0.4 => grafana/4.0.8}/CONFIG.md (100%) create mode 100644 stable/grafana/4.0.8/Chart.lock rename stable/grafana/{4.0.7 => 4.0.8}/Chart.yaml (96%) rename stable/grafana/{4.0.7 => 4.0.8}/README.md (100%) rename stable/grafana/{4.0.7 => 4.0.8}/app-readme.md (100%) rename stable/{homer/2.0.4 => grafana/4.0.8}/charts/common-10.0.10.tgz (100%) rename stable/grafana/{4.0.7 => 4.0.8}/helm-values.md (100%) rename stable/grafana/{4.0.7 => 4.0.8}/ix_values.yaml (95%) rename stable/grafana/{4.0.7 => 4.0.8}/questions.yaml (100%) rename stable/grafana/{4.0.7 => 4.0.8}/security.md (95%) rename stable/{homer/2.0.4 => grafana/4.0.8}/templates/common.yaml (100%) rename stable/grafana/{4.0.7 => 4.0.8}/templates/prometheusrules.yaml (100%) rename stable/grafana/{4.0.7 => 4.0.8}/templates/servicemonitor.yaml (100%) rename stable/{homer/2.0.4 => grafana/4.0.8}/values.yaml (100%) create mode 100644 stable/home-assistant/15.0.6/CHANGELOG.md rename stable/{ispy-agent-dvr/2.0.6 => home-assistant/15.0.6}/CONFIG.md (100%) rename stable/{mattermost/3.0.4 => home-assistant/15.0.6}/Chart.lock (85%) create mode 100644 stable/home-assistant/15.0.6/Chart.yaml create mode 100644 stable/home-assistant/15.0.6/README.md create mode 100644 stable/home-assistant/15.0.6/app-readme.md rename stable/{ispy-agent-dvr/2.0.6 => home-assistant/15.0.6}/charts/common-10.0.10.tgz (100%) rename stable/{mattermost/3.0.4 => home-assistant/15.0.6}/charts/postgresql-8.0.7.tgz (100%) create mode 100644 stable/home-assistant/15.0.6/helm-values.md create mode 100644 stable/home-assistant/15.0.6/ix_values.yaml create mode 100644 stable/home-assistant/15.0.6/questions.yaml create mode 100644 stable/home-assistant/15.0.6/security.md create mode 100644 stable/home-assistant/15.0.6/templates/common.yaml rename stable/{ispy-agent-dvr/2.0.6 => home-assistant/15.0.6}/values.yaml (100%) delete mode 100644 stable/homer/2.0.4/Chart.lock rename stable/homer/{2.0.4 => 2.0.5}/CHANGELOG.md (91%) rename stable/{littlelink/6.0.6 => homer/2.0.5}/CONFIG.md (100%) create mode 100644 stable/homer/2.0.5/Chart.lock rename stable/homer/{2.0.4 => 2.0.5}/Chart.yaml (95%) rename stable/homer/{2.0.4 => 2.0.5}/README.md (100%) rename stable/homer/{2.0.4 => 2.0.5}/app-readme.md (100%) rename stable/{littlelink/6.0.6 => homer/2.0.5}/charts/common-10.0.10.tgz (100%) rename stable/homer/{2.0.4 => 2.0.5}/helm-values.md (100%) rename stable/homer/{2.0.4 => 2.0.5}/ix_values.yaml (78%) rename stable/homer/{2.0.4 => 2.0.5}/questions.yaml (100%) rename stable/homer/{2.0.4 => 2.0.5}/security.md (81%) rename stable/{ispy-agent-dvr/2.0.6 => homer/2.0.5}/templates/common.yaml (100%) rename stable/{littlelink/6.0.6 => homer/2.0.5}/values.yaml (100%) delete mode 100644 stable/ispy-agent-dvr/2.0.6/Chart.lock rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/CHANGELOG.md (91%) rename stable/{n8n/4.0.6 => ispy-agent-dvr/2.0.7}/CONFIG.md (100%) create mode 100644 stable/ispy-agent-dvr/2.0.7/Chart.lock rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/Chart.yaml (95%) rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/README.md (100%) rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/app-readme.md (100%) rename stable/{mattermost/3.0.4 => ispy-agent-dvr/2.0.7}/charts/common-10.0.10.tgz (100%) rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/helm-values.md (100%) rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/ix_values.yaml (95%) rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/questions.yaml (100%) rename stable/ispy-agent-dvr/{2.0.6 => 2.0.7}/security.md (95%) rename stable/{mattermost/3.0.4 => ispy-agent-dvr/2.0.7}/templates/common.yaml (100%) rename stable/{mattermost/3.0.4 => ispy-agent-dvr/2.0.7}/values.yaml (100%) create mode 100644 stable/jackett/11.0.9/CHANGELOG.md rename stable/{omada-controller/6.0.8 => jackett/11.0.9}/CONFIG.md (100%) create mode 100644 stable/jackett/11.0.9/Chart.lock create mode 100644 stable/jackett/11.0.9/Chart.yaml create mode 100644 stable/jackett/11.0.9/README.md create mode 100644 stable/jackett/11.0.9/app-readme.md rename stable/{n8n/4.0.6 => jackett/11.0.9}/charts/common-10.0.10.tgz (100%) create mode 100644 stable/jackett/11.0.9/helm-values.md create mode 100644 stable/jackett/11.0.9/ix_values.yaml create mode 100644 stable/jackett/11.0.9/questions.yaml create mode 100644 stable/jackett/11.0.9/security.md rename stable/{omada-controller/6.0.8 => jackett/11.0.9}/templates/common.yaml (100%) rename stable/{n8n/4.0.6 => jackett/11.0.9}/values.yaml (100%) delete mode 100644 stable/littlelink/6.0.6/Chart.lock rename stable/littlelink/{6.0.6 => 6.0.7}/CHANGELOG.md (90%) rename stable/{prometheus/4.0.7 => littlelink/6.0.7}/CONFIG.md (100%) create mode 100644 stable/littlelink/6.0.7/Chart.lock rename stable/littlelink/{6.0.6 => 6.0.7}/Chart.yaml (98%) rename stable/littlelink/{6.0.6 => 6.0.7}/README.md (100%) rename stable/littlelink/{6.0.6 => 6.0.7}/app-readme.md (100%) rename stable/{nocodb/3.0.4 => littlelink/6.0.7}/charts/common-10.0.10.tgz (100%) rename stable/littlelink/{6.0.6 => 6.0.7}/helm-values.md (100%) rename stable/littlelink/{6.0.6 => 6.0.7}/ix_values.yaml (93%) rename stable/littlelink/{6.0.6 => 6.0.7}/questions.yaml (100%) rename stable/littlelink/{6.0.6 => 6.0.7}/security.md (95%) rename stable/littlelink/{6.0.6 => 6.0.7}/templates/_configmap.tpl (100%) rename stable/littlelink/{6.0.6 => 6.0.7}/templates/common.yaml (100%) rename stable/{nocodb/3.0.4 => littlelink/6.0.7}/values.yaml (100%) rename stable/mattermost/{3.0.4 => 3.0.5}/CHANGELOG.md (91%) rename stable/{babybuddy/8.0.4 => mattermost/3.0.5}/Chart.lock (85%) rename stable/mattermost/{3.0.4 => 3.0.5}/Chart.yaml (98%) rename stable/mattermost/{3.0.4 => 3.0.5}/README.md (100%) rename stable/mattermost/{3.0.4 => 3.0.5}/app-readme.md (100%) rename stable/{omada-controller/6.0.8 => mattermost/3.0.5}/charts/common-10.0.10.tgz (100%) rename stable/{n8n/4.0.6 => mattermost/3.0.5}/charts/postgresql-8.0.7.tgz (100%) rename stable/mattermost/{3.0.4 => 3.0.5}/ix_values.yaml (92%) rename stable/mattermost/{3.0.4 => 3.0.5}/questions.yaml (100%) rename stable/mattermost/{3.0.4 => 3.0.5}/security.md (99%) rename stable/{rsshub/3.0.8 => mattermost/3.0.5}/templates/common.yaml (100%) rename stable/{omada-controller/6.0.8 => mattermost/3.0.5}/values.yaml (100%) rename stable/n8n/{4.0.6 => 4.0.7}/CHANGELOG.md (90%) rename stable/{rsshub/3.0.8 => n8n/4.0.7}/CONFIG.md (100%) rename stable/n8n/{4.0.6 => 4.0.7}/Chart.lock (88%) rename stable/n8n/{4.0.6 => 4.0.7}/Chart.yaml (96%) rename stable/n8n/{4.0.6 => 4.0.7}/README.md (100%) rename stable/n8n/{4.0.6 => 4.0.7}/app-readme.md (100%) rename stable/{prometheus => n8n}/4.0.7/charts/common-10.0.10.tgz (100%) rename stable/{nocodb/3.0.4 => n8n/4.0.7}/charts/postgresql-8.0.7.tgz (100%) rename stable/n8n/{4.0.6 => 4.0.7}/charts/redis-3.0.7.tgz (100%) rename stable/n8n/{4.0.6 => 4.0.7}/helm-values.md (100%) rename stable/n8n/{4.0.6 => 4.0.7}/ix_values.yaml (97%) rename stable/n8n/{4.0.6 => 4.0.7}/questions.yaml (100%) rename stable/n8n/{4.0.6 => 4.0.7}/security.md (100%) rename stable/n8n/{4.0.6 => 4.0.7}/templates/_configmap.tpl (100%) rename stable/n8n/{4.0.6 => 4.0.7}/templates/common.yaml (100%) rename stable/{prometheus => n8n}/4.0.7/values.yaml (100%) rename stable/nocodb/{3.0.4 => 3.0.5}/CHANGELOG.md (91%) rename stable/nocodb/{3.0.4 => 3.0.5}/Chart.lock (88%) rename stable/nocodb/{3.0.4 => 3.0.5}/Chart.yaml (96%) rename stable/nocodb/{3.0.4 => 3.0.5}/README.md (100%) rename stable/nocodb/{3.0.4 => 3.0.5}/app-readme.md (100%) rename stable/{rsshub/3.0.8 => nocodb/3.0.5}/charts/common-10.0.10.tgz (100%) rename stable/{synapse/4.0.3 => nocodb/3.0.5}/charts/postgresql-8.0.7.tgz (100%) rename stable/nocodb/{3.0.4 => 3.0.5}/charts/redis-3.0.7.tgz (100%) rename stable/nocodb/{3.0.4 => 3.0.5}/ix_values.yaml (92%) rename stable/nocodb/{3.0.4 => 3.0.5}/questions.yaml (100%) rename stable/nocodb/{3.0.4 => 3.0.5}/security.md (99%) rename stable/nocodb/{3.0.4 => 3.0.5}/templates/_configmap.tpl (100%) rename stable/nocodb/{3.0.4 => 3.0.5}/templates/_secrets.tpl (100%) rename stable/nocodb/{3.0.4 => 3.0.5}/templates/common.yaml (100%) rename stable/{rsshub/3.0.8 => nocodb/3.0.5}/values.yaml (100%) delete mode 100644 stable/omada-controller/6.0.8/Chart.lock rename stable/omada-controller/{6.0.8 => 6.0.9}/CHANGELOG.md (91%) rename stable/{snipe-it/4.0.4 => omada-controller/6.0.9}/CONFIG.md (100%) create mode 100644 stable/omada-controller/6.0.9/Chart.lock rename stable/omada-controller/{6.0.8 => 6.0.9}/Chart.yaml (98%) rename stable/omada-controller/{6.0.8 => 6.0.9}/README.md (100%) rename stable/omada-controller/{6.0.8 => 6.0.9}/app-readme.md (100%) rename stable/{snipe-it/4.0.4 => omada-controller/6.0.9}/charts/common-10.0.10.tgz (100%) rename stable/omada-controller/{6.0.8 => 6.0.9}/helm-values.md (100%) rename stable/omada-controller/{6.0.8 => 6.0.9}/ix_values.yaml (93%) rename stable/omada-controller/{6.0.8 => 6.0.9}/questions.yaml (100%) rename stable/omada-controller/{6.0.8 => 6.0.9}/security.md (98%) rename stable/{storj-node/2.0.4 => omada-controller/6.0.9}/templates/common.yaml (100%) rename stable/{snipe-it/4.0.4 => omada-controller/6.0.9}/values.yaml (100%) create mode 100644 stable/plex/10.0.5/CHANGELOG.md rename stable/{storj-node/2.0.4 => plex/10.0.5}/CONFIG.md (100%) create mode 100644 stable/plex/10.0.5/Chart.lock create mode 100644 stable/plex/10.0.5/Chart.yaml create mode 100644 stable/plex/10.0.5/README.md create mode 100644 stable/plex/10.0.5/app-readme.md rename stable/{storj-node/2.0.4 => plex/10.0.5}/charts/common-10.0.10.tgz (100%) create mode 100644 stable/plex/10.0.5/helm-values.md create mode 100644 stable/plex/10.0.5/ix_values.yaml create mode 100644 stable/plex/10.0.5/questions.yaml create mode 100644 stable/plex/10.0.5/security.md rename stable/{trilium-notes/5.0.1 => plex/10.0.5}/templates/common.yaml (100%) rename stable/{storj-node/2.0.4 => plex/10.0.5}/values.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/CHANGELOG.md (91%) rename stable/{synapse/4.0.3 => prometheus/4.0.8}/CONFIG.md (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/Chart.lock (89%) rename stable/prometheus/{4.0.7 => 4.0.8}/Chart.yaml (98%) rename stable/prometheus/{4.0.7 => 4.0.8}/README.md (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/app-readme.md (100%) rename stable/{synapse/4.0.3 => prometheus/4.0.8}/charts/common-10.0.10.tgz (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/charts/kube-state-metrics-3.1.0.tgz (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/charts/node-exporter-3.0.3.tgz (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-alertmanager-config.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-alertmanager.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-podmonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-probes.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-prometheus.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-prometheusrules.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/crds/crd-thanosrulers.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/helm-values.md (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/ix_values.yaml (99%) rename stable/prometheus/{4.0.7 => 4.0.8}/questions.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/security.md (99%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/_helpers.tpl (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/alertmanager/_alertmanager.tpl (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/alertmanager/secrets.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/alertmanager/serviceaccount.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/alertmanager/servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/common.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/core-dns/service.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/core-dns/servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kube-apiserver/servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kube-controller-manager/endpoints.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kube-controller-manager/service.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kube-controller-manager/servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kube-scheduler/endpoints.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kube-scheduler/service.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kube-scheduler/servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/exporters/kubelet/servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/operator/_args.tpl (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/operator/configmap.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/operator/servicemonitor.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/prometheus/_additionalPrometheusRules.tpl (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/prometheus/_additionalScrapeJobs.tpl (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/prometheus/_prometheus.tpl (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/prometheus/_servicemonitor.tpl (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/prometheus/clusterrole.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/prometheus/clusterrolebinding.yaml (100%) rename stable/prometheus/{4.0.7 => 4.0.8}/templates/prometheus/serviceaccount.yaml (100%) rename stable/{synapse/4.0.3 => prometheus/4.0.8}/values.yaml (100%) rename stable/rsshub/{3.0.8 => 3.0.9}/CHANGELOG.md (92%) rename stable/{trilium-notes/5.0.1 => rsshub/3.0.9}/CONFIG.md (100%) rename stable/rsshub/{3.0.8 => 3.0.9}/Chart.lock (85%) rename stable/rsshub/{3.0.8 => 3.0.9}/Chart.yaml (98%) rename stable/rsshub/{3.0.8 => 3.0.9}/README.md (100%) rename stable/rsshub/{3.0.8 => 3.0.9}/app-readme.md (100%) rename stable/{trilium-notes/5.0.1 => rsshub/3.0.9}/charts/common-10.0.10.tgz (100%) rename stable/rsshub/{3.0.8 => 3.0.9}/charts/redis-3.0.7.tgz (100%) rename stable/rsshub/{3.0.8 => 3.0.9}/helm-values.md (100%) rename stable/rsshub/{3.0.8 => 3.0.9}/ix_values.yaml (93%) rename stable/rsshub/{3.0.8 => 3.0.9}/questions.yaml (100%) rename stable/rsshub/{3.0.8 => 3.0.9}/security.md (99%) create mode 100644 stable/rsshub/3.0.9/templates/common.yaml rename stable/{trilium-notes/5.0.1 => rsshub/3.0.9}/values.yaml (100%) rename stable/snipe-it/{4.0.4 => 4.0.5}/CHANGELOG.md (91%) create mode 100644 stable/snipe-it/4.0.5/CONFIG.md rename stable/snipe-it/{4.0.4 => 4.0.5}/Chart.lock (88%) rename stable/snipe-it/{4.0.4 => 4.0.5}/Chart.yaml (96%) rename stable/snipe-it/{4.0.4 => 4.0.5}/README.md (100%) rename stable/snipe-it/{4.0.4 => 4.0.5}/app-readme.md (100%) create mode 100644 stable/snipe-it/4.0.5/charts/common-10.0.10.tgz rename stable/snipe-it/{4.0.4 => 4.0.5}/charts/mariadb-3.0.7.tgz (100%) rename stable/snipe-it/{4.0.4 => 4.0.5}/charts/redis-3.0.7.tgz (100%) rename stable/snipe-it/{4.0.4 => 4.0.5}/helm-values.md (100%) rename stable/snipe-it/{4.0.4 => 4.0.5}/ix_values.yaml (95%) rename stable/snipe-it/{4.0.4 => 4.0.5}/questions.yaml (100%) rename stable/snipe-it/{4.0.4 => 4.0.5}/security.md (92%) rename stable/snipe-it/{4.0.4 => 4.0.5}/templates/_secrets.tpl (100%) rename stable/snipe-it/{4.0.4 => 4.0.5}/templates/common.yaml (100%) rename stable/{storj-node/2.0.4/SKIPINSTALL => snipe-it/4.0.5/values.yaml} (100%) delete mode 100644 stable/storj-node/2.0.4/Chart.lock rename stable/storj-node/{2.0.4 => 2.0.5}/CHANGELOG.md (90%) create mode 100644 stable/storj-node/2.0.5/CONFIG.md create mode 100644 stable/storj-node/2.0.5/Chart.lock rename stable/storj-node/{2.0.4 => 2.0.5}/Chart.yaml (95%) rename stable/storj-node/{2.0.4 => 2.0.5}/README.md (100%) create mode 100644 stable/storj-node/2.0.5/SKIPINSTALL rename stable/storj-node/{2.0.4 => 2.0.5}/app-readme.md (100%) create mode 100644 stable/storj-node/2.0.5/charts/common-10.0.10.tgz rename stable/storj-node/{2.0.4 => 2.0.5}/helm-values.md (100%) rename stable/storj-node/{2.0.4 => 2.0.5}/ix_values.yaml (90%) rename stable/storj-node/{2.0.4 => 2.0.5}/questions.yaml (100%) rename stable/storj-node/{2.0.4 => 2.0.5}/security.md (99%) create mode 100644 stable/storj-node/2.0.5/templates/common.yaml create mode 100644 stable/storj-node/2.0.5/values.yaml rename stable/synapse/{4.0.3 => 4.0.4}/CHANGELOG.md (89%) create mode 100644 stable/synapse/4.0.4/CONFIG.md create mode 100644 stable/synapse/4.0.4/Chart.lock rename stable/synapse/{4.0.3 => 4.0.4}/Chart.yaml (95%) rename stable/synapse/{4.0.3 => 4.0.4}/README.md (100%) rename stable/synapse/{4.0.3 => 4.0.4}/app-readme.md (100%) create mode 100644 stable/synapse/4.0.4/charts/common-10.0.10.tgz create mode 100644 stable/synapse/4.0.4/charts/postgresql-8.0.7.tgz rename stable/synapse/{4.0.3 => 4.0.4}/ci/base-values.yaml (100%) rename stable/synapse/{4.0.3 => 4.0.4}/ci/basic-values.yaml (100%) rename stable/synapse/{4.0.3 => 4.0.4}/helm-values.md (100%) rename stable/synapse/{4.0.3 => 4.0.4}/ix_values.yaml (99%) rename stable/synapse/{4.0.3 => 4.0.4}/questions.yaml (100%) rename stable/synapse/{4.0.3 => 4.0.4}/security.md (100%) rename stable/synapse/{4.0.3 => 4.0.4}/templates/_configmap.tpl (100%) rename stable/synapse/{4.0.3 => 4.0.4}/templates/_helpers.tpl (100%) rename stable/synapse/{4.0.3 => 4.0.4}/templates/_secret.tpl (100%) rename stable/synapse/{4.0.3 => 4.0.4}/templates/common.yaml (100%) create mode 100644 stable/synapse/4.0.4/values.yaml create mode 100644 stable/traefik/12.0.5/CHANGELOG.md create mode 100644 stable/traefik/12.0.5/CONFIG.md create mode 100644 stable/traefik/12.0.5/Chart.lock create mode 100644 stable/traefik/12.0.5/Chart.yaml create mode 100644 stable/traefik/12.0.5/README.md create mode 100644 stable/traefik/12.0.5/app-readme.md create mode 100644 stable/traefik/12.0.5/charts/common-10.0.10.tgz create mode 100644 stable/traefik/12.0.5/crds/ingressroute.yaml create mode 100644 stable/traefik/12.0.5/crds/ingressroutetcp.yaml create mode 100644 stable/traefik/12.0.5/crds/ingressrouteudp.yaml create mode 100644 stable/traefik/12.0.5/crds/middlewares.yaml create mode 100644 stable/traefik/12.0.5/crds/middlewarestcp.yaml create mode 100644 stable/traefik/12.0.5/crds/serverstransports.yaml create mode 100644 stable/traefik/12.0.5/crds/tlsoptions.yaml create mode 100644 stable/traefik/12.0.5/crds/tlsstores.yaml create mode 100644 stable/traefik/12.0.5/crds/traefikservices.yaml create mode 100644 stable/traefik/12.0.5/helm-values.md create mode 100644 stable/traefik/12.0.5/ix_values.yaml create mode 100644 stable/traefik/12.0.5/questions.yaml create mode 100644 stable/traefik/12.0.5/security.md create mode 100644 stable/traefik/12.0.5/templates/_args.tpl create mode 100644 stable/traefik/12.0.5/templates/_helpers.tpl create mode 100644 stable/traefik/12.0.5/templates/_ingressclass.tpl create mode 100644 stable/traefik/12.0.5/templates/_ingressroute.tpl create mode 100644 stable/traefik/12.0.5/templates/_portalhook.tpl create mode 100644 stable/traefik/12.0.5/templates/_tlsoptions.tpl create mode 100644 stable/traefik/12.0.5/templates/common.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/basic-middleware.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/basicauth.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/chain.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/forwardauth.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/ipwhitelist.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/ratelimit.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/redirectScheme.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/redirectregex.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/stripPrefixRegex.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/tc-chains.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/tc-headers.yaml create mode 100644 stable/traefik/12.0.5/templates/middlewares/tc-nextcloud.yaml create mode 100644 stable/traefik/12.0.5/values.yaml delete mode 100644 stable/trilium-notes/5.0.1/Chart.lock rename stable/trilium-notes/{5.0.1 => 5.0.2}/CHANGELOG.md (90%) create mode 100644 stable/trilium-notes/5.0.2/CONFIG.md create mode 100644 stable/trilium-notes/5.0.2/Chart.lock rename stable/trilium-notes/{5.0.1 => 5.0.2}/Chart.yaml (95%) rename stable/trilium-notes/{5.0.1 => 5.0.2}/README.md (100%) rename stable/trilium-notes/{5.0.1 => 5.0.2}/app-readme.md (100%) create mode 100644 stable/trilium-notes/5.0.2/charts/common-10.0.10.tgz rename stable/trilium-notes/{5.0.1 => 5.0.2}/helm-values.md (100%) rename stable/trilium-notes/{5.0.1 => 5.0.2}/ix_values.yaml (80%) rename stable/trilium-notes/{5.0.1 => 5.0.2}/questions.yaml (100%) rename stable/trilium-notes/{5.0.1 => 5.0.2}/security.md (95%) create mode 100644 stable/trilium-notes/5.0.2/templates/common.yaml create mode 100644 stable/trilium-notes/5.0.2/values.yaml diff --git a/incubator/appsmith/2.0.5/CHANGELOG.md b/incubator/appsmith/2.0.6/CHANGELOG.md similarity index 91% rename from incubator/appsmith/2.0.5/CHANGELOG.md rename to incubator/appsmith/2.0.6/CHANGELOG.md index 8332fdd1dcd..25fff3f4e8b 100644 --- a/incubator/appsmith/2.0.5/CHANGELOG.md +++ b/incubator/appsmith/2.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [appsmith-2.0.6](https://github.com/truecharts/apps/compare/appsmith-2.0.5...appsmith-2.0.6) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [appsmith-2.0.5](https://github.com/truecharts/apps/compare/appsmith-2.0.4...appsmith-2.0.5) (2022-06-14) @@ -88,12 +97,3 @@ #### Refactor * BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - - - -### [appsmith-0.0.16](https://github.com/truecharts/apps/compare/appsmith-0.0.15...appsmith-0.0.16) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) diff --git a/incubator/appsmith/2.0.5/Chart.lock b/incubator/appsmith/2.0.6/Chart.lock similarity index 85% rename from incubator/appsmith/2.0.5/Chart.lock rename to incubator/appsmith/2.0.6/Chart.lock index 06cf4663043..b14b066fbd1 100644 --- a/incubator/appsmith/2.0.5/Chart.lock +++ b/incubator/appsmith/2.0.6/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org version: 3.0.7 digest: sha256:4b715113d39e117d6d4d509c18bd1e1e8ac24b9185c28035b3d8c43552c7130d -generated: "2022-06-14T18:49:10.925112783Z" +generated: "2022-06-15T07:30:56.076520875Z" diff --git a/incubator/appsmith/2.0.5/Chart.yaml b/incubator/appsmith/2.0.6/Chart.yaml similarity index 96% rename from incubator/appsmith/2.0.5/Chart.yaml rename to incubator/appsmith/2.0.6/Chart.yaml index fcde4ec3bec..c5f6f542f8e 100644 --- a/incubator/appsmith/2.0.5/Chart.yaml +++ b/incubator/appsmith/2.0.6/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "1.7.1" +appVersion: "1.7.2" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -25,7 +25,7 @@ maintainers: name: appsmith sources: - https://github.com/appsmithorg/appsmith -version: 2.0.5 +version: 2.0.6 annotations: truecharts.org/catagories: | - productivity diff --git a/incubator/appsmith/2.0.5/README.md b/incubator/appsmith/2.0.6/README.md similarity index 100% rename from incubator/appsmith/2.0.5/README.md rename to incubator/appsmith/2.0.6/README.md diff --git a/incubator/appsmith/2.0.5/app-readme.md b/incubator/appsmith/2.0.6/app-readme.md similarity index 100% rename from incubator/appsmith/2.0.5/app-readme.md rename to incubator/appsmith/2.0.6/app-readme.md diff --git a/incubator/appsmith/2.0.5/charts/common-10.0.10.tgz b/incubator/appsmith/2.0.6/charts/common-10.0.10.tgz similarity index 100% rename from incubator/appsmith/2.0.5/charts/common-10.0.10.tgz rename to incubator/appsmith/2.0.6/charts/common-10.0.10.tgz diff --git a/incubator/appsmith/2.0.5/charts/redis-3.0.7.tgz b/incubator/appsmith/2.0.6/charts/redis-3.0.7.tgz similarity index 100% rename from incubator/appsmith/2.0.5/charts/redis-3.0.7.tgz rename to incubator/appsmith/2.0.6/charts/redis-3.0.7.tgz diff --git a/incubator/appsmith/2.0.5/ix_values.yaml b/incubator/appsmith/2.0.6/ix_values.yaml similarity index 90% rename from incubator/appsmith/2.0.5/ix_values.yaml rename to incubator/appsmith/2.0.6/ix_values.yaml index 8848db69045..565cebbd030 100644 --- a/incubator/appsmith/2.0.5/ix_values.yaml +++ b/incubator/appsmith/2.0.6/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/appsmith - tag: v1.7.1@sha256:0893039f38c422a6e6ece38e950a6b92da865c8bf6ecefafcd94633f9f587e7b + tag: v1.7.2@sha256:cad52c484141f04ad6dcbfea5a7b6600b9acab1c20b2a91ec3b8a4e77fdd82ab pullPolicy: IfNotPresent securityContext: diff --git a/incubator/appsmith/2.0.5/questions.yaml b/incubator/appsmith/2.0.6/questions.yaml similarity index 100% rename from incubator/appsmith/2.0.5/questions.yaml rename to incubator/appsmith/2.0.6/questions.yaml diff --git a/incubator/appsmith/2.0.5/security.md b/incubator/appsmith/2.0.6/security.md similarity index 99% rename from incubator/appsmith/2.0.5/security.md rename to incubator/appsmith/2.0.6/security.md index 29ccebb360b..a06c94b2573 100644 --- a/incubator/appsmith/2.0.5/security.md +++ b/incubator/appsmith/2.0.6/security.md @@ -54,7 +54,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/redis:v7.0.2@sha256:1260b1716a9b5062f0f4bbd0bf213adcc64c822f429c9c094f22291ae903ded8 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/appsmith:v1.7.1@sha256:0893039f38c422a6e6ece38e950a6b92da865c8bf6ecefafcd94633f9f587e7b + tccr.io/truecharts/appsmith:v1.7.2@sha256:cad52c484141f04ad6dcbfea5a7b6600b9acab1c20b2a91ec3b8a4e77fdd82ab ##### Scan Results @@ -155,10 +155,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -175,8 +175,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -184,8 +184,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -226,7 +226,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/appsmith:v1.7.1@sha256:0893039f38c422a6e6ece38e950a6b92da865c8bf6ecefafcd94633f9f587e7b (ubuntu 20.04) +#### Container: tccr.io/truecharts/appsmith:v1.7.2@sha256:cad52c484141f04ad6dcbfea5a7b6600b9acab1c20b2a91ec3b8a4e77fdd82ab (ubuntu 20.04) **ubuntu** @@ -301,10 +301,10 @@ hide: | libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| | libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libnss3 | CVE-2022-22747 | LOW | 2:3.49.1-1ubuntu1.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
https://linux.oracle.com/cve/CVE-2022-22747.html
https://linux.oracle.com/errata/ELSA-2022-0130.html
https://ubuntu.com/security/notices/USN-5229-1
https://ubuntu.com/security/notices/USN-5246-1
https://ubuntu.com/security/notices/USN-5248-1
https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/#CVE-2022-22747
| | libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| @@ -324,8 +324,8 @@ hide: | libtiff5 | CVE-2022-1354 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| | libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libtiff5 | CVE-2022-22844 | LOW | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| | linux-libc-dev | CVE-2013-7445 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| @@ -355,7 +355,7 @@ hide: | linux-libc-dev | CVE-2022-0494 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
| | linux-libc-dev | CVE-2022-0998 | MEDIUM | 5.4.0-117.132 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/02/1
https://access.redhat.com/security/cve/CVE-2022-0998
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0998
https://security.netapp.com/advisory/ntap-20220513-0003/
| | linux-libc-dev | CVE-2022-1012 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
https://git.kernel.org/linus/b2d057560b8107c633b39aabe517ff9d93f285e3 (5.18-rc6)
https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/
https://ubuntu.com/security/notices/USN-5471-1
| -| linux-libc-dev | CVE-2022-1048 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| +| linux-libc-dev | CVE-2022-1048 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://linux.oracle.com/cve/CVE-2022-1048.html
https://linux.oracle.com/errata/ELSA-2022-9480.html
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| | linux-libc-dev | CVE-2022-1195 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2056381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
| | linux-libc-dev | CVE-2022-1263 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
https://ubuntu.com/security/notices/USN-5469-1
https://www.openwall.com/lists/oss-security/2022/04/07/1
https://www.spinics.net/lists/kvm/msg273052.html
| | linux-libc-dev | CVE-2022-1508 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
| @@ -389,10 +389,10 @@ hide: | linux-libc-dev | CVE-2022-0854 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
| | linux-libc-dev | CVE-2022-1729 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
https://github.com/torvalds/linux/commit/3ac6487e584a1eb54071dbe1212e05b884136704
https://linux.oracle.com/cve/CVE-2022-1729.html
https://linux.oracle.com/errata/ELSA-2022-9413.html
https://lore.kernel.org/all/20220520183806.GV2578@worktop.programming.kicks-ass.net/T/#u
https://www.openwall.com/lists/oss-security/2022/05/20/2
| | login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | openssh-client | CVE-2020-14145 | LOW | 1:8.2p1-4ubuntu0.5 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| | openssh-client | CVE-2021-41617 | LOW | 1:8.2p1-4ubuntu0.5 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| diff --git a/incubator/appsmith/2.0.5/templates/common.yaml b/incubator/appsmith/2.0.6/templates/common.yaml similarity index 100% rename from incubator/appsmith/2.0.5/templates/common.yaml rename to incubator/appsmith/2.0.6/templates/common.yaml diff --git a/incubator/appsmith/2.0.5/values.yaml b/incubator/appsmith/2.0.6/values.yaml similarity index 100% rename from incubator/appsmith/2.0.5/values.yaml rename to incubator/appsmith/2.0.6/values.yaml diff --git a/incubator/dashdot/0.0.1/CHANGELOG.md b/incubator/dashdot/0.0.1/CHANGELOG.md deleted file mode 100644 index 8fadd7648ea..00000000000 --- a/incubator/dashdot/0.0.1/CHANGELOG.md +++ /dev/null @@ -1,10 +0,0 @@ -# Changelog
- - - -### dashdot-0.0.1 (2022-06-14) - -#### Feat - -* add dashdot and jump ([#2867](https://github.com/truecharts/apps/issues/2867)) - diff --git a/incubator/dashdot/0.0.2/CHANGELOG.md b/incubator/dashdot/0.0.2/CHANGELOG.md new file mode 100644 index 00000000000..f2fa398ef7b --- /dev/null +++ b/incubator/dashdot/0.0.2/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [dashdot-0.0.2](https://github.com/truecharts/apps/compare/dashdot-0.0.1...dashdot-0.0.2) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + + +### dashdot-0.0.1 (2022-06-14) + +#### Feat + +* add dashdot and jump ([#2867](https://github.com/truecharts/apps/issues/2867)) diff --git a/incubator/dashdot/0.0.1/Chart.lock b/incubator/dashdot/0.0.2/Chart.lock similarity index 80% rename from incubator/dashdot/0.0.1/Chart.lock rename to incubator/dashdot/0.0.2/Chart.lock index f2c0690cb11..8c5f7055175 100644 --- a/incubator/dashdot/0.0.1/Chart.lock +++ b/incubator/dashdot/0.0.2/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.0.9 digest: sha256:ecc7cc7417a00bc40309e68f23ad56ec383550afcbe45fce648a9d9771712609 -generated: "2022-06-14T21:28:49.285898701Z" +generated: "2022-06-15T07:30:51.914973008Z" diff --git a/incubator/dashdot/0.0.1/Chart.yaml b/incubator/dashdot/0.0.2/Chart.yaml similarity index 95% rename from incubator/dashdot/0.0.1/Chart.yaml rename to incubator/dashdot/0.0.2/Chart.yaml index 229acea3503..334056e5beb 100644 --- a/incubator/dashdot/0.0.1/Chart.yaml +++ b/incubator/dashdot/0.0.2/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "3.2.1" +appVersion: "3.3.3" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -19,7 +19,7 @@ name: dashdot sources: - https://github.com/MauriceNino/dashdot - https://hub.docker.com/r/mauricenino/dashdot -version: 0.0.1 +version: 0.0.2 annotations: truecharts.org/catagories: | - media diff --git a/incubator/dashdot/0.0.1/README.md b/incubator/dashdot/0.0.2/README.md similarity index 100% rename from incubator/dashdot/0.0.1/README.md rename to incubator/dashdot/0.0.2/README.md diff --git a/incubator/dashdot/0.0.1/app-readme.md b/incubator/dashdot/0.0.2/app-readme.md similarity index 100% rename from incubator/dashdot/0.0.1/app-readme.md rename to incubator/dashdot/0.0.2/app-readme.md diff --git a/incubator/dashdot/0.0.1/charts/common-10.0.9.tgz b/incubator/dashdot/0.0.2/charts/common-10.0.9.tgz similarity index 100% rename from incubator/dashdot/0.0.1/charts/common-10.0.9.tgz rename to incubator/dashdot/0.0.2/charts/common-10.0.9.tgz diff --git a/incubator/dashdot/0.0.1/ix_values.yaml b/incubator/dashdot/0.0.2/ix_values.yaml similarity index 91% rename from incubator/dashdot/0.0.1/ix_values.yaml rename to incubator/dashdot/0.0.2/ix_values.yaml index 0174735dc4c..ae4e31b529f 100644 --- a/incubator/dashdot/0.0.1/ix_values.yaml +++ b/incubator/dashdot/0.0.2/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: mauricenino/dashdot - tag: 3.2.1@sha256:0b1fb7b078b6865bb3c13363cc00f2d336b2cbd8cfb065e10d75f6c979af7fb5 + tag: 3.3.3@sha256:5cb60d5ab847f5e15ace2290381622cb359d153415958d6e39ed04df7bb9bf2c pullPolicy: IfNotPresent securityContext: diff --git a/incubator/dashdot/0.0.1/questions.yaml b/incubator/dashdot/0.0.2/questions.yaml similarity index 100% rename from incubator/dashdot/0.0.1/questions.yaml rename to incubator/dashdot/0.0.2/questions.yaml diff --git a/incubator/dashdot/0.0.1/security.md b/incubator/dashdot/0.0.2/security.md similarity index 98% rename from incubator/dashdot/0.0.1/security.md rename to incubator/dashdot/0.0.2/security.md index fc538ce443f..f3d5834a393 100644 --- a/incubator/dashdot/0.0.1/security.md +++ b/incubator/dashdot/0.0.2/security.md @@ -12,9 +12,9 @@ hide: ##### Scan Results #### Chart Object: dashdot/templates/common.yaml - - + + | Type | Misconfiguration ID | Check | Severity | Explaination | Links | |:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| | Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-dashdot' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| @@ -38,17 +38,17 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - mauricenino/dashdot:3.2.1@sha256:0b1fb7b078b6865bb3c13363cc00f2d336b2cbd8cfb065e10d75f6c979af7fb5 + mauricenino/dashdot:3.3.3@sha256:5cb60d5ab847f5e15ace2290381622cb359d153415958d6e39ed04df7bb9bf2c ##### Scan Results #### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) - + **alpine** - + | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| @@ -64,22 +64,19 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: mauricenino/dashdot:3.2.1@sha256:0b1fb7b078b6865bb3c13363cc00f2d336b2cbd8cfb065e10d75f6c979af7fb5 (alpine 3.16.0) - +#### Container: mauricenino/dashdot:3.3.3@sha256:5cb60d5ab847f5e15ace2290381622cb359d153415958d6e39ed04df7bb9bf2c (alpine 3.16.0) + **alpine** - + | No Vulnerabilities found | |:---------------------------------| - + **node-pkg** - + | No Vulnerabilities found | |:---------------------------------| - - - diff --git a/incubator/dashdot/0.0.1/templates/common.yaml b/incubator/dashdot/0.0.2/templates/common.yaml similarity index 100% rename from incubator/dashdot/0.0.1/templates/common.yaml rename to incubator/dashdot/0.0.2/templates/common.yaml diff --git a/incubator/dashdot/0.0.1/values.yaml b/incubator/dashdot/0.0.2/values.yaml similarity index 100% rename from incubator/dashdot/0.0.1/values.yaml rename to incubator/dashdot/0.0.2/values.yaml diff --git a/incubator/jump/0.0.1/CHANGELOG.md b/incubator/jump/0.0.1/CHANGELOG.md deleted file mode 100644 index a49eb4e98ea..00000000000 --- a/incubator/jump/0.0.1/CHANGELOG.md +++ /dev/null @@ -1,10 +0,0 @@ -# Changelog
- - - -### jump-0.0.1 (2022-06-14) - -#### Feat - -* add dashdot and jump ([#2867](https://github.com/truecharts/apps/issues/2867)) - diff --git a/incubator/jump/0.0.2/CHANGELOG.md b/incubator/jump/0.0.2/CHANGELOG.md new file mode 100644 index 00000000000..687e3699e95 --- /dev/null +++ b/incubator/jump/0.0.2/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [jump-0.0.2](https://github.com/truecharts/apps/compare/jump-0.0.1...jump-0.0.2) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + + +### jump-0.0.1 (2022-06-14) + +#### Feat + +* add dashdot and jump ([#2867](https://github.com/truecharts/apps/issues/2867)) diff --git a/incubator/jump/0.0.1/Chart.lock b/incubator/jump/0.0.2/Chart.lock similarity index 80% rename from incubator/jump/0.0.1/Chart.lock rename to incubator/jump/0.0.2/Chart.lock index 6fe908bae39..00c6e4f9d7d 100644 --- a/incubator/jump/0.0.1/Chart.lock +++ b/incubator/jump/0.0.2/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.0.9 digest: sha256:ecc7cc7417a00bc40309e68f23ad56ec383550afcbe45fce648a9d9771712609 -generated: "2022-06-14T21:28:49.293951489Z" +generated: "2022-06-15T07:30:51.96828709Z" diff --git a/incubator/jump/0.0.1/Chart.yaml b/incubator/jump/0.0.2/Chart.yaml similarity index 98% rename from incubator/jump/0.0.1/Chart.yaml rename to incubator/jump/0.0.2/Chart.yaml index 98832aab279..3eb563fab49 100644 --- a/incubator/jump/0.0.1/Chart.yaml +++ b/incubator/jump/0.0.2/Chart.yaml @@ -19,7 +19,7 @@ name: jump sources: - https://github.com/daledavies/jump - https://hub.docker.com/r/daledavies/jump -version: 0.0.1 +version: 0.0.2 annotations: truecharts.org/catagories: | - media diff --git a/incubator/jump/0.0.1/README.md b/incubator/jump/0.0.2/README.md similarity index 100% rename from incubator/jump/0.0.1/README.md rename to incubator/jump/0.0.2/README.md diff --git a/incubator/jump/0.0.1/app-readme.md b/incubator/jump/0.0.2/app-readme.md similarity index 100% rename from incubator/jump/0.0.1/app-readme.md rename to incubator/jump/0.0.2/app-readme.md diff --git a/incubator/jump/0.0.1/charts/common-10.0.9.tgz b/incubator/jump/0.0.2/charts/common-10.0.9.tgz similarity index 100% rename from incubator/jump/0.0.1/charts/common-10.0.9.tgz rename to incubator/jump/0.0.2/charts/common-10.0.9.tgz diff --git a/incubator/jump/0.0.1/ix_values.yaml b/incubator/jump/0.0.2/ix_values.yaml similarity index 84% rename from incubator/jump/0.0.1/ix_values.yaml rename to incubator/jump/0.0.2/ix_values.yaml index f33958b7cbb..1d7e0541695 100644 --- a/incubator/jump/0.0.1/ix_values.yaml +++ b/incubator/jump/0.0.2/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: daledavies/jump - tag: v1.2.1@sha256:d7726d922000400e58c47555a5a6b6ac74bf04c435e526682bb07c0de6d35c75 + tag: v1.2.1@sha256:d4782419f76f7b16213c0a04fa687d78a871a0984f45cc2bee1490b8ea63d757 pullPolicy: IfNotPresent securityContext: diff --git a/incubator/jump/0.0.1/questions.yaml b/incubator/jump/0.0.2/questions.yaml similarity index 100% rename from incubator/jump/0.0.1/questions.yaml rename to incubator/jump/0.0.2/questions.yaml diff --git a/incubator/jump/0.0.1/security.md b/incubator/jump/0.0.2/security.md similarity index 92% rename from incubator/jump/0.0.1/security.md rename to incubator/jump/0.0.2/security.md index 12e837bbcfa..87a0df835ea 100644 --- a/incubator/jump/0.0.1/security.md +++ b/incubator/jump/0.0.2/security.md @@ -12,9 +12,9 @@ hide: ##### Scan Results #### Chart Object: jump/templates/common.yaml - - + + | Type | Misconfiguration ID | Check | Severity | Explaination | Links | |:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| | Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jump' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| @@ -36,17 +36,17 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - daledavies/jump:v1.2.1@sha256:d7726d922000400e58c47555a5a6b6ac74bf04c435e526682bb07c0de6d35c75 + daledavies/jump:v1.2.1@sha256:d4782419f76f7b16213c0a04fa687d78a871a0984f45cc2bee1490b8ea63d757 ##### Scan Results #### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) - + **alpine** - + | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| @@ -62,12 +62,12 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: daledavies/jump:v1.2.1@sha256:d7726d922000400e58c47555a5a6b6ac74bf04c435e526682bb07c0de6d35c75 (alpine 3.16.0) - +#### Container: daledavies/jump:v1.2.1@sha256:d4782419f76f7b16213c0a04fa687d78a871a0984f45cc2bee1490b8ea63d757 (alpine 3.16.0) + **alpine** - + | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | pcre2 | CVE-2022-1586 | CRITICAL | 10.39-r0 | 10.40-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| @@ -75,9 +75,8 @@ hide: **composer** - + | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| guzzlehttp/guzzle | CVE-2022-31042 | HIGH | 6.5.6 | 7.4.4, 6.5.7 |
Expand...https://github.com/advisories/GHSA-f2wf-25xc-69c9
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| -| guzzlehttp/guzzle | CVE-2022-31043 | HIGH | 6.5.6 | 7.4.4, 6.5.7 |
Expand...https://github.com/advisories/GHSA-w248-ffj2-4v5q
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| - +| guzzlehttp/guzzle | CVE-2022-31042 | HIGH | 6.5.6 | 6.5.7, 7.4.4 |
Expand...https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31042.yaml
https://github.com/advisories/GHSA-f2wf-25xc-69c9
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
https://nvd.nist.gov/vuln/detail/CVE-2022-31042
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| +| guzzlehttp/guzzle | CVE-2022-31043 | HIGH | 6.5.6 | 7.4.4, 6.5.7 |
Expand...https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31043.yaml
https://github.com/advisories/GHSA-w248-ffj2-4v5q
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
https://nvd.nist.gov/vuln/detail/CVE-2022-31043
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| diff --git a/incubator/jump/0.0.1/templates/common.yaml b/incubator/jump/0.0.2/templates/common.yaml similarity index 100% rename from incubator/jump/0.0.1/templates/common.yaml rename to incubator/jump/0.0.2/templates/common.yaml diff --git a/incubator/jump/0.0.1/values.yaml b/incubator/jump/0.0.2/values.yaml similarity index 100% rename from incubator/jump/0.0.1/values.yaml rename to incubator/jump/0.0.2/values.yaml diff --git a/stable/babybuddy/8.0.4/CHANGELOG.md b/stable/babybuddy/8.0.5/CHANGELOG.md similarity index 90% rename from stable/babybuddy/8.0.4/CHANGELOG.md rename to stable/babybuddy/8.0.5/CHANGELOG.md index 149f11e2ce9..ce7418a84c4 100644 --- a/stable/babybuddy/8.0.4/CHANGELOG.md +++ b/stable/babybuddy/8.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [babybuddy-8.0.5](https://github.com/truecharts/apps/compare/babybuddy-8.0.4...babybuddy-8.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [babybuddy-8.0.4](https://github.com/truecharts/apps/compare/babybuddy-8.0.3...babybuddy-8.0.4) (2022-06-14) @@ -88,12 +97,3 @@ #### Chore * update docker general non-major ([#2821](https://github.com/truecharts/apps/issues/2821)) - - - - -### [babybuddy-6.0.34](https://github.com/truecharts/apps/compare/babybuddy-6.0.33...babybuddy-6.0.34) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) diff --git a/stable/babybuddy/8.0.4/CONFIG.md b/stable/babybuddy/8.0.5/CONFIG.md similarity index 100% rename from stable/babybuddy/8.0.4/CONFIG.md rename to stable/babybuddy/8.0.5/CONFIG.md diff --git a/stable/synapse/4.0.3/Chart.lock b/stable/babybuddy/8.0.5/Chart.lock similarity index 85% rename from stable/synapse/4.0.3/Chart.lock rename to stable/babybuddy/8.0.5/Chart.lock index f9d83f4ccbf..20aa04c0071 100644 --- a/stable/synapse/4.0.3/Chart.lock +++ b/stable/babybuddy/8.0.5/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org/ version: 8.0.7 digest: sha256:2b4c13c14e572773165d89a3f24c637b85e6f0350c73bb5ee029464a014327d6 -generated: "2022-06-14T19:06:30.586386771Z" +generated: "2022-06-15T07:30:56.189692049Z" diff --git a/stable/babybuddy/8.0.4/Chart.yaml b/stable/babybuddy/8.0.5/Chart.yaml similarity index 96% rename from stable/babybuddy/8.0.4/Chart.yaml rename to stable/babybuddy/8.0.5/Chart.yaml index 3e472fd7347..eb5a6741d3b 100644 --- a/stable/babybuddy/8.0.4/Chart.yaml +++ b/stable/babybuddy/8.0.5/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 -appVersion: "1.11.0" +appVersion: "1.11.1" kubeVersion: '>=1.16.0-0' -version: 8.0.4 +version: 8.0.5 name: babybuddy description: Helps caregivers track sleep, feedings, diaper changes, tummy time and more to learn about and predict baby's needs without (as much) guess work. type: application diff --git a/stable/babybuddy/8.0.4/README.md b/stable/babybuddy/8.0.5/README.md similarity index 100% rename from stable/babybuddy/8.0.4/README.md rename to stable/babybuddy/8.0.5/README.md diff --git a/stable/babybuddy/8.0.4/app-readme.md b/stable/babybuddy/8.0.5/app-readme.md similarity index 100% rename from stable/babybuddy/8.0.4/app-readme.md rename to stable/babybuddy/8.0.5/app-readme.md diff --git a/stable/babybuddy/8.0.4/charts/common-10.0.10.tgz b/stable/babybuddy/8.0.5/charts/common-10.0.10.tgz similarity index 100% rename from stable/babybuddy/8.0.4/charts/common-10.0.10.tgz rename to stable/babybuddy/8.0.5/charts/common-10.0.10.tgz diff --git a/stable/babybuddy/8.0.4/charts/postgresql-8.0.7.tgz b/stable/babybuddy/8.0.5/charts/postgresql-8.0.7.tgz similarity index 100% rename from stable/babybuddy/8.0.4/charts/postgresql-8.0.7.tgz rename to stable/babybuddy/8.0.5/charts/postgresql-8.0.7.tgz diff --git a/stable/babybuddy/8.0.4/helm-values.md b/stable/babybuddy/8.0.5/helm-values.md similarity index 100% rename from stable/babybuddy/8.0.4/helm-values.md rename to stable/babybuddy/8.0.5/helm-values.md diff --git a/stable/babybuddy/8.0.4/ix_values.yaml b/stable/babybuddy/8.0.5/ix_values.yaml similarity index 90% rename from stable/babybuddy/8.0.4/ix_values.yaml rename to stable/babybuddy/8.0.5/ix_values.yaml index e28dd957cc9..140c58edd23 100644 --- a/stable/babybuddy/8.0.4/ix_values.yaml +++ b/stable/babybuddy/8.0.5/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/babybuddy pullPolicy: IfNotPresent - tag: v1.11.0@sha256:6d31e506cd44a32f6d5017b68734f84cd070f8095eac8f81a3a439f86d9d91b4 + tag: v1.11.1@sha256:754b3bed09f9fa936fb97b2c0144eb9bd997cc4a45626733af8d619adfb81931 env: DB_ENGINE: "django.db.backends.postgresql" diff --git a/stable/babybuddy/8.0.4/questions.yaml b/stable/babybuddy/8.0.5/questions.yaml similarity index 100% rename from stable/babybuddy/8.0.4/questions.yaml rename to stable/babybuddy/8.0.5/questions.yaml diff --git a/stable/babybuddy/8.0.4/security.md b/stable/babybuddy/8.0.5/security.md similarity index 99% rename from stable/babybuddy/8.0.4/security.md rename to stable/babybuddy/8.0.5/security.md index e7a3526e5e9..bd31f4d6c39 100644 --- a/stable/babybuddy/8.0.4/security.md +++ b/stable/babybuddy/8.0.5/security.md @@ -60,7 +60,7 @@ hide: tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 - tccr.io/truecharts/babybuddy:v1.11.0@sha256:6d31e506cd44a32f6d5017b68734f84cd070f8095eac8f81a3a439f86d9d91b4 + tccr.io/truecharts/babybuddy:v1.11.1@sha256:754b3bed09f9fa936fb97b2c0144eb9bd997cc4a45626733af8d619adfb81931 ##### Scan Results @@ -169,10 +169,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -191,8 +191,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -209,8 +209,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -342,10 +342,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -364,8 +364,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -382,8 +382,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| diff --git a/stable/babybuddy/8.0.4/templates/common.yaml b/stable/babybuddy/8.0.5/templates/common.yaml similarity index 100% rename from stable/babybuddy/8.0.4/templates/common.yaml rename to stable/babybuddy/8.0.5/templates/common.yaml diff --git a/stable/babybuddy/8.0.4/values.yaml b/stable/babybuddy/8.0.5/values.yaml similarity index 100% rename from stable/babybuddy/8.0.4/values.yaml rename to stable/babybuddy/8.0.5/values.yaml diff --git a/stable/budge/2.0.4/CHANGELOG.md b/stable/budge/2.0.5/CHANGELOG.md similarity index 90% rename from stable/budge/2.0.4/CHANGELOG.md rename to stable/budge/2.0.5/CHANGELOG.md index c7df7c83e2f..a3b935454e8 100644 --- a/stable/budge/2.0.4/CHANGELOG.md +++ b/stable/budge/2.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [budge-2.0.5](https://github.com/truecharts/apps/compare/budge-2.0.4...budge-2.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [budge-2.0.4](https://github.com/truecharts/apps/compare/budge-2.0.3...budge-2.0.4) (2022-06-14) @@ -88,12 +97,3 @@ - -### [budge-1.0.31](https://github.com/truecharts/apps/compare/budge-1.0.30...budge-1.0.31) (2022-05-26) - -#### Chore - -* update helm general non-major helm releases ([#2759](https://github.com/truecharts/apps/issues/2759)) - - - diff --git a/stable/budge/2.0.4/CONFIG.md b/stable/budge/2.0.5/CONFIG.md similarity index 100% rename from stable/budge/2.0.4/CONFIG.md rename to stable/budge/2.0.5/CONFIG.md diff --git a/stable/cyberchef/2.0.6/Chart.lock b/stable/budge/2.0.5/Chart.lock similarity index 80% rename from stable/cyberchef/2.0.6/Chart.lock rename to stable/budge/2.0.5/Chart.lock index ee14fa1fa73..31b1dc93f82 100644 --- a/stable/cyberchef/2.0.6/Chart.lock +++ b/stable/budge/2.0.5/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.0.10 digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:15:10.149519112Z" +generated: "2022-06-15T07:31:18.919095161Z" diff --git a/stable/budge/2.0.4/Chart.yaml b/stable/budge/2.0.5/Chart.yaml similarity index 97% rename from stable/budge/2.0.4/Chart.yaml rename to stable/budge/2.0.5/Chart.yaml index 8df6cbb5b43..2867a6de1a3 100644 --- a/stable/budge/2.0.4/Chart.yaml +++ b/stable/budge/2.0.5/Chart.yaml @@ -19,7 +19,7 @@ name: budge sources: - https://github.com/linuxserver/budge - https://github.com/linuxserver/docker-BudgE -version: 2.0.4 +version: 2.0.5 annotations: truecharts.org/catagories: | - media diff --git a/stable/budge/2.0.4/README.md b/stable/budge/2.0.5/README.md similarity index 100% rename from stable/budge/2.0.4/README.md rename to stable/budge/2.0.5/README.md diff --git a/stable/budge/2.0.4/app-readme.md b/stable/budge/2.0.5/app-readme.md similarity index 100% rename from stable/budge/2.0.4/app-readme.md rename to stable/budge/2.0.5/app-readme.md diff --git a/stable/budge/2.0.4/charts/common-10.0.10.tgz b/stable/budge/2.0.5/charts/common-10.0.10.tgz similarity index 100% rename from stable/budge/2.0.4/charts/common-10.0.10.tgz rename to stable/budge/2.0.5/charts/common-10.0.10.tgz diff --git a/stable/budge/2.0.4/helm-values.md b/stable/budge/2.0.5/helm-values.md similarity index 100% rename from stable/budge/2.0.4/helm-values.md rename to stable/budge/2.0.5/helm-values.md diff --git a/stable/budge/2.0.4/ix_values.yaml b/stable/budge/2.0.5/ix_values.yaml similarity index 82% rename from stable/budge/2.0.4/ix_values.yaml rename to stable/budge/2.0.5/ix_values.yaml index 5d49d924514..dfd80925ebc 100644 --- a/stable/budge/2.0.4/ix_values.yaml +++ b/stable/budge/2.0.5/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/budge - tag: v0.0.9@sha256:8e51912255afd102cf894042d0a84d1509941d0602e3b0ee884f8582621a7d63 + tag: v0.0.9@sha256:fe8272345a2de2122c74e4fcf7d2ab11638a7bea0ecba2418fa074c90291cd56 pullPolicy: IfNotPresent securityContext: diff --git a/stable/budge/2.0.4/questions.yaml b/stable/budge/2.0.5/questions.yaml similarity index 100% rename from stable/budge/2.0.4/questions.yaml rename to stable/budge/2.0.5/questions.yaml diff --git a/stable/budge/2.0.4/security.md b/stable/budge/2.0.5/security.md similarity index 98% rename from stable/budge/2.0.4/security.md rename to stable/budge/2.0.5/security.md index 3ffd520332a..f00e15e096f 100644 --- a/stable/budge/2.0.4/security.md +++ b/stable/budge/2.0.5/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/budge:v0.0.9@sha256:8e51912255afd102cf894042d0a84d1509941d0602e3b0ee884f8582621a7d63 + tccr.io/truecharts/budge:v0.0.9@sha256:fe8272345a2de2122c74e4fcf7d2ab11638a7bea0ecba2418fa074c90291cd56 ##### Scan Results @@ -51,11 +51,11 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| diff --git a/stable/budge/2.0.4/templates/common.yaml b/stable/budge/2.0.5/templates/common.yaml similarity index 100% rename from stable/budge/2.0.4/templates/common.yaml rename to stable/budge/2.0.5/templates/common.yaml diff --git a/stable/budge/2.0.4/values.yaml b/stable/budge/2.0.5/values.yaml similarity index 100% rename from stable/budge/2.0.4/values.yaml rename to stable/budge/2.0.5/values.yaml diff --git a/stable/calibre-web/11.0.6/CHANGELOG.md b/stable/calibre-web/11.0.6/CHANGELOG.md new file mode 100644 index 00000000000..c3e81338e05 --- /dev/null +++ b/stable/calibre-web/11.0.6/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [calibre-web-11.0.6](https://github.com/truecharts/apps/compare/calibre-web-11.0.5...calibre-web-11.0.6) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + + +### [calibre-web-11.0.5](https://github.com/truecharts/apps/compare/calibre-web-11.0.4...calibre-web-11.0.5) (2022-06-14) + +#### Chore + +* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886)) + + + + +### [calibre-web-11.0.4](https://github.com/truecharts/apps/compare/calibre-web-11.0.3...calibre-web-11.0.4) (2022-06-11) + +#### Chore + +* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854)) + + + + +### [calibre-web-11.0.3](https://github.com/truecharts/apps/compare/calibre-web-11.0.2...calibre-web-11.0.3) (2022-06-08) + +#### Chore + +* Auto-update chart README [skip ci] +* Auto-update chart README [skip ci] +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [calibre-web-11.0.3](https://github.com/truecharts/apps/compare/calibre-web-11.0.2...calibre-web-11.0.3) (2022-06-08) + +#### Chore + +* Auto-update chart README [skip ci] +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [calibre-web-11.0.3](https://github.com/truecharts/apps/compare/calibre-web-11.0.2...calibre-web-11.0.3) (2022-06-08) + +#### Chore + +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [calibre-web-11.0.2](https://github.com/truecharts/apps/compare/calibre-web-11.0.1...calibre-web-11.0.2) (2022-06-07) + +#### Fix + +* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format. + + + + +### [calibre-web-11.0.1](https://github.com/truecharts/apps/compare/calibre-web-10.0.29...calibre-web-11.0.1) (2022-06-07) + +#### Chore + +* Auto-update chart README [skip ci] +* sync all apps persistence configuration and always default to PVC + +#### Fix + +* remove malfunctioning SCALE migration script + +#### Refactor + +* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) + + + + +### [calibre-web-11.0.0](https://github.com/truecharts/apps/compare/calibre-web-10.0.29...calibre-web-11.0.0) (2022-06-07) + +#### Chore + +* sync all apps persistence configuration and always default to PVC + +#### Refactor + +* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) + + diff --git a/stable/custom-app/5.0.8/CONFIG.md b/stable/calibre-web/11.0.6/CONFIG.md similarity index 100% rename from stable/custom-app/5.0.8/CONFIG.md rename to stable/calibre-web/11.0.6/CONFIG.md diff --git a/stable/custom-app/5.0.8/Chart.lock b/stable/calibre-web/11.0.6/Chart.lock similarity index 80% rename from stable/custom-app/5.0.8/Chart.lock rename to stable/calibre-web/11.0.6/Chart.lock index 45127cdd463..074866d1031 100644 --- a/stable/custom-app/5.0.8/Chart.lock +++ b/stable/calibre-web/11.0.6/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.0.10 digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:15:06.266494011Z" +generated: "2022-06-15T07:31:21.19433703Z" diff --git a/stable/calibre-web/11.0.6/Chart.yaml b/stable/calibre-web/11.0.6/Chart.yaml new file mode 100644 index 00000000000..cc14837f811 --- /dev/null +++ b/stable/calibre-web/11.0.6/Chart.yaml @@ -0,0 +1,31 @@ +apiVersion: v2 +appVersion: "0.6.18" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +deprecated: false +description: Calibre-Web is a web app providing a clean interface for browsing, reading + and downloading eBooks using an existing Calibre database. +home: https://github.com/truecharts/apps/tree/master/charts/stable/calibre-web +icon: https://truecharts.org/_static/img/appicons/calibre-web.png +keywords: +- calibre-web +- calibre +- ebook +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: calibre-web +sources: +- https://hub.docker.com/r/linuxserver/calibre-web/ +- https://github.com/janeczku/calibre-web +type: application +version: 11.0.6 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/calibre-web/11.0.6/README.md b/stable/calibre-web/11.0.6/README.md new file mode 100644 index 00000000000..701f58e2e58 --- /dev/null +++ b/stable/calibre-web/11.0.6/README.md @@ -0,0 +1,38 @@ +# Introduction + +Calibre-Web is a web app providing a clean interface for browsing, reading and downloading eBooks using an existing Calibre database. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 10.0.10 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/calibre-web/11.0.6/app-readme.md b/stable/calibre-web/11.0.6/app-readme.md new file mode 100644 index 00000000000..d3bada96503 --- /dev/null +++ b/stable/calibre-web/11.0.6/app-readme.md @@ -0,0 +1,3 @@ +Calibre-Web is a web app providing a clean interface for browsing, reading and downloading eBooks using an existing Calibre database. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/custom-app/5.0.8/charts/common-10.0.10.tgz b/stable/calibre-web/11.0.6/charts/common-10.0.10.tgz similarity index 100% rename from stable/custom-app/5.0.8/charts/common-10.0.10.tgz rename to stable/calibre-web/11.0.6/charts/common-10.0.10.tgz diff --git a/stable/calibre-web/11.0.6/helm-values.md b/stable/calibre-web/11.0.6/helm-values.md new file mode 100644 index 00000000000..c9c6bc509c5 --- /dev/null +++ b/stable/calibre-web/11.0.6/helm-values.md @@ -0,0 +1,26 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/calibre-web"` | | +| image.tag | string | `"v0.6.17@sha256:9d6da0594a4906f5027226e2afa1a5fdb03a4a06c255c7115e9855924efc4216"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `8083` | | +| service.main.ports.main.targetPort | int | `8083` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/calibre-web/11.0.6/ix_values.yaml b/stable/calibre-web/11.0.6/ix_values.yaml new file mode 100644 index 00000000000..53a7db06347 --- /dev/null +++ b/stable/calibre-web/11.0.6/ix_values.yaml @@ -0,0 +1,24 @@ +image: + repository: tccr.io/truecharts/calibre-web + pullPolicy: IfNotPresent + tag: v0.6.18@sha256:b3f261cdb7e4be491c58663a2ce4f483d927a0c19b1e32e5d1b7674707da0885 + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 8083 + targetPort: 8083 + +persistence: + config: + enabled: true + mountPath: "/config" diff --git a/stable/calibre-web/11.0.6/questions.yaml b/stable/calibre-web/11.0.6/questions.yaml new file mode 100644 index 00000000000..a5ebbc7b267 --- /dev/null +++ b/stable/calibre-web/11.0.6/questions.yaml @@ -0,0 +1,2430 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 8083 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8083 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + +# - variable: autoscaling +# group: "Advanced" +# label: "(Advanced) Horizontal Pod Autoscaler" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: target +# label: "Target" +# description: "deployment name, defaults to main deployment" +# schema: +# type: string +# default: "" +# - variable: minReplicas +# label: "Minimum Replicas" +# schema: +# type: int +# default: 1 +# - variable: maxReplicas +# label: "Maximum Replicas" +# schema: +# type: int +# default: 5 +# - variable: targetCPUUtilizationPercentage +# label: "Target CPU Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: targetMemoryUtilizationPercentage +# label: "Target Memory Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: networkPolicy +# group: "Advanced" +# label: "(Advanced) Network Policy" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: policyType +# label: "Policy Type" +# schema: +# type: string +# default: "" +# enum: +# - value: "" +# description: "Default" +# - value: "ingress" +# description: "Ingress" +# - value: "egress" +# description: "Egress" +# - value: "ingress-egress" +# description: "Ingress and Egress" +# - variable: egress +# label: "Egress" +# schema: +# type: list +# default: [] +# items: +# - variable: egressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: to +# label: "To" +# schema: +# type: list +# default: [] +# items: +# - variable: toEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" +# - variable: ingress +# label: "Ingress" +# schema: +# type: list +# default: [] +# items: +# - variable: ingressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: from +# label: "From" +# schema: +# type: list +# default: [] +# items: +# - variable: fromEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/calibre-web/11.0.6/security.md b/stable/calibre-web/11.0.6/security.md new file mode 100644 index 00000000000..57d66e1b022 --- /dev/null +++ b/stable/calibre-web/11.0.6/security.md @@ -0,0 +1,242 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: calibre-web/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-calibre-web' of Deployment 'RELEASE-NAME-calibre-web' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-calibre-web' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-calibre-web' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-calibre-web' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-calibre-web' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-calibre-web' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-calibre-web' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-calibre-web' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/calibre-web:v0.6.18@sha256:b3f261cdb7e4be491c58663a2ce4f483d927a0c19b1e32e5d1b7674707da0885 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/calibre-web:v0.6.18@sha256:b3f261cdb7e4be491c58663a2ce4f483d927a0c19b1e32e5d1b7674707da0885 (ubuntu 20.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| bash | CVE-2019-18276 | LOW | 5.0-6ubuntu1.1 | 5.0-6ubuntu1.2 |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| +| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7ubuntu3 | 1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
https://ubuntu.com/security/notices/USN-5446-1
https://ubuntu.com/security/notices/USN-5446-2
| +| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| gzip | CVE-2022-1271 | MEDIUM | 1.10-0ubuntu4 | 1.10-0ubuntu4.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-4991.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| +| imagemagick | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick | CVE-2020-27752 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
| +| imagemagick | CVE-2020-29599 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://github.com/ImageMagick/ImageMagick/discussions/2851
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
https://linux.oracle.com/cve/CVE-2020-29599.html
https://linux.oracle.com/errata/ELSA-2021-0024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
https://security.gentoo.org/glsa/202101-36
| +| imagemagick | CVE-2021-20241 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick | CVE-2021-20243 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick | CVE-2021-20244 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20245 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick | CVE-2021-20246 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20309 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20312 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-20313 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick | CVE-2021-3596 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
| +| imagemagick | CVE-2021-39212 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick-6-common | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick-6-common | CVE-2020-27752 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
| +| imagemagick-6-common | CVE-2020-29599 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://github.com/ImageMagick/ImageMagick/discussions/2851
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
https://linux.oracle.com/cve/CVE-2020-29599.html
https://linux.oracle.com/errata/ELSA-2021-0024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
https://security.gentoo.org/glsa/202101-36
| +| imagemagick-6-common | CVE-2021-20241 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick-6-common | CVE-2021-20243 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick-6-common | CVE-2021-20244 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20245 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6-common | CVE-2021-20246 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20309 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20312 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-20313 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6-common | CVE-2021-3596 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
| +| imagemagick-6-common | CVE-2021-39212 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| imagemagick-6.q16 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick-6.q16 | CVE-2020-27752 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
| +| imagemagick-6.q16 | CVE-2020-29599 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://github.com/ImageMagick/ImageMagick/discussions/2851
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
https://linux.oracle.com/cve/CVE-2020-29599.html
https://linux.oracle.com/errata/ELSA-2021-0024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
https://security.gentoo.org/glsa/202101-36
| +| imagemagick-6.q16 | CVE-2021-20241 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick-6.q16 | CVE-2021-20243 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
| +| imagemagick-6.q16 | CVE-2021-20244 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20245 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| imagemagick-6.q16 | CVE-2021-20246 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20309 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20312 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-20313 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| imagemagick-6.q16 | CVE-2021-3596 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
| +| imagemagick-6.q16 | CVE-2021-39212 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| krb5-locales | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| krb5-locales | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libapparmor1 | CVE-2016-1585 | MEDIUM | 2.13.3-7ubuntu5.1 | |
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1585
| +| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| libcairo2 | CVE-2017-7475 | LOW | 1.16.0-4ubuntu1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| +| libcairo2 | CVE-2018-18064 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libcairo2 | CVE-2019-6461 | LOW | 1.16.0-4ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
| +| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libfreetype6 | CVE-2022-27404 | MEDIUM | 2.10.1-2ubuntu0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| +| libfreetype6 | CVE-2022-27405 | LOW | 2.10.1-2ubuntu0.1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| +| libfreetype6 | CVE-2022-27406 | LOW | 2.10.1-2ubuntu0.1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
https://ubuntu.com/security/notices/USN-5453-1
| +| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
| +| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1build1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://access.redhat.com/security/cve/CVE-2017-9937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libjbig2dec0 | CVE-2017-9216 | LOW | 0.18-1ubuntu1 | |
Expand...http://www.securityfocus.com/bid/98680
https://access.redhat.com/security/cve/CVE-2017-9216
https://bugs.ghostscript.com/show_bug.cgi?id=697934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9216
https://lists.debian.org/debian-lts-announce/2021/10/msg00023.html
https://ubuntu.com/security/notices/USN-5405-1
| +| libjpeg-turbo8 | CVE-2020-17541 | LOW | 2.0.3-0ubuntu1.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-17541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17541
| +| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| liblzma5 | CVE-2022-1271 | MEDIUM | 5.2.4-1ubuntu1 | 5.2.4-1ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-4991.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| +| libmagickcore-6.q16-6 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickcore-6.q16-6 | CVE-2020-27752 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
| +| libmagickcore-6.q16-6 | CVE-2020-29599 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://github.com/ImageMagick/ImageMagick/discussions/2851
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
https://linux.oracle.com/cve/CVE-2020-29599.html
https://linux.oracle.com/errata/ELSA-2021-0024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
https://security.gentoo.org/glsa/202101-36
| +| libmagickcore-6.q16-6 | CVE-2021-20241 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickcore-6.q16-6 | CVE-2021-20243 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickcore-6.q16-6 | CVE-2021-20244 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20245 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6 | CVE-2021-20246 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20309 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20312 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-20313 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6 | CVE-2021-3596 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
| +| libmagickcore-6.q16-6 | CVE-2021-39212 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickcore-6.q16-6-extra | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickcore-6.q16-6-extra | CVE-2020-27752 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
| +| libmagickcore-6.q16-6-extra | CVE-2020-29599 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://github.com/ImageMagick/ImageMagick/discussions/2851
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
https://linux.oracle.com/cve/CVE-2020-29599.html
https://linux.oracle.com/errata/ELSA-2021-0024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
https://security.gentoo.org/glsa/202101-36
| +| libmagickcore-6.q16-6-extra | CVE-2021-20241 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickcore-6.q16-6-extra | CVE-2021-20243 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickcore-6.q16-6-extra | CVE-2021-20244 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6-extra | CVE-2021-20245 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickcore-6.q16-6-extra | CVE-2021-20246 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6-extra | CVE-2021-20309 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6-extra | CVE-2021-20312 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6-extra | CVE-2021-20313 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickcore-6.q16-6-extra | CVE-2021-3596 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
| +| libmagickcore-6.q16-6-extra | CVE-2021-39212 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libmagickwand-6.q16-6 | CVE-2020-25664 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-25664
https://bugzilla.redhat.com/show_bug.cgi?id=1891605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z3J6D7POCQYQKNVRDYLTTPM5SQC3WVTR/
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickwand-6.q16-6 | CVE-2020-27752 | MEDIUM | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27752
https://bugzilla.redhat.com/show_bug.cgi?id=1894226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
| +| libmagickwand-6.q16-6 | CVE-2020-29599 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://github.com/ImageMagick/ImageMagick/discussions/2851
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
https://linux.oracle.com/cve/CVE-2020-29599.html
https://linux.oracle.com/errata/ELSA-2021-0024.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
https://security.gentoo.org/glsa/202101-36
| +| libmagickwand-6.q16-6 | CVE-2021-20241 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickwand-6.q16-6 | CVE-2021-20243 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5335-1
| +| libmagickwand-6.q16-6 | CVE-2021-20244 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://github.com/ImageMagick/ImageMagick/pull/3194
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20245 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20245
https://bugzilla.redhat.com/show_bug.cgi?id=1928943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://github.com/ImageMagick/ImageMagick/issues/3176
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
| +| libmagickwand-6.q16-6 | CVE-2021-20246 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20309 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20309
https://bugzilla.redhat.com/show_bug.cgi?id=1946722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20312 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20312
https://bugzilla.redhat.com/show_bug.cgi?id=1946742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-20313 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20313
https://bugzilla.redhat.com/show_bug.cgi?id=1947019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
https://ubuntu.com/security/notices/USN-5158-1
| +| libmagickwand-6.q16-6 | CVE-2021-3596 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3596
https://bugzilla.redhat.com/show_bug.cgi?id=1970569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3596
https://github.com/ImageMagick/ImageMagick/issues/2624
https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html
| +| libmagickwand-6.q16-6 | CVE-2021-39212 | LOW | 8:6.9.10.23+dfsg-2.1ubuntu11.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libnss3 | CVE-2022-22747 | LOW | 2:3.49.1-1ubuntu1.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
https://linux.oracle.com/cve/CVE-2022-22747.html
https://linux.oracle.com/errata/ELSA-2022-0130.html
https://ubuntu.com/security/notices/USN-5229-1
https://ubuntu.com/security/notices/USN-5246-1
https://ubuntu.com/security/notices/USN-5248-1
https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/#CVE-2022-22747
| +| libopenexr24 | CVE-2021-20296 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20296
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
https://bugzilla.redhat.com/show_bug.cgi?id=1939141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
https://www.openexr.com/
| +| libopenexr24 | CVE-2021-3598 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3598
https://bugzilla.redhat.com/show_bug.cgi?id=1970987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
https://github.com/AcademySoftwareFoundation/openexr/pull/1037
https://ubuntu.com/security/notices/USN-4996-1
https://ubuntu.com/security/notices/USN-4996-2
| +| libopenexr24 | CVE-2021-45942 | LOW | 2.3.0-6ubuntu0.5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45942
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr/pull/1209
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/
| +| libopenjp2-7 | CVE-2019-6988 | LOW | 2.3.1-1ubuntu4.20.04.1 | |
Expand...http://www.securityfocus.com/bid/106785
https://access.redhat.com/security/cve/CVE-2019-6988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| +| libopenjp2-7 | CVE-2021-29338 | LOW | 2.3.1-1ubuntu4.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| +| libopenjp2-7 | CVE-2021-3575 | LOW | 2.3.1-1ubuntu4.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3575
https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
https://ubuntu.com/security/CVE-2021-3575
| +| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpython3.8-minimal | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libpython3.8-stdlib | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsepol1 | CVE-2021-36084 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libtiff5 | CVE-2022-1354 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| +| libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff5 | CVE-2022-22844 | LOW | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| python3.8 | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| python3.8-minimal | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| unrar | CVE-2018-25018 | MEDIUM | 1:5.6.6-2build1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25018
https://github.com/aawc/unrar/releases
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unrar/OSV-2018-204.yaml
| +| unrar | CVE-2022-30333 | MEDIUM | 1:5.6.6-2build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30333
https://github.com/debian-calibre/unrar-nonfree/compare/upstream/6.1.6...upstream/6.1.7
https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz
https://www.rarlab.com/rar_add.htm
| + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| Werkzeug | CVE-2022-29361 | CRITICAL | 2.0.3 | 2.1.1 |
Expand...https://github.com/pallets/werkzeug/commit/9a3a981d70d2e9ec3344b5192f86fcaf3210cd85
https://github.com/pallets/werkzeug/issues/2420
| diff --git a/stable/custom-app/5.0.8/templates/common.yaml b/stable/calibre-web/11.0.6/templates/common.yaml similarity index 100% rename from stable/custom-app/5.0.8/templates/common.yaml rename to stable/calibre-web/11.0.6/templates/common.yaml diff --git a/stable/custom-app/5.0.8/values.yaml b/stable/calibre-web/11.0.6/values.yaml similarity index 100% rename from stable/custom-app/5.0.8/values.yaml rename to stable/calibre-web/11.0.6/values.yaml diff --git a/stable/custom-app/5.0.8/ix_values.yaml b/stable/custom-app/5.0.8/ix_values.yaml deleted file mode 100644 index b4bc7a08571..00000000000 --- a/stable/custom-app/5.0.8/ix_values.yaml +++ /dev/null @@ -1,4 +0,0 @@ -image: - repository: tccr.io/truecharts/jackett - pullPolicy: IfNotPresent - tag: v0.20.1175@sha256:13a9ab977993061452c27897bacb8ea75467a3c47f2baa66994274e10963ec43 diff --git a/stable/custom-app/5.0.8/CHANGELOG.md b/stable/custom-app/5.0.9/CHANGELOG.md similarity index 91% rename from stable/custom-app/5.0.8/CHANGELOG.md rename to stable/custom-app/5.0.9/CHANGELOG.md index e312dc50f31..a1bbe075104 100644 --- a/stable/custom-app/5.0.8/CHANGELOG.md +++ b/stable/custom-app/5.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [custom-app-5.0.9](https://github.com/truecharts/apps/compare/custom-app-5.0.8...custom-app-5.0.9) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [custom-app-5.0.8](https://github.com/truecharts/apps/compare/custom-app-5.0.7...custom-app-5.0.8) (2022-06-14) @@ -88,12 +97,3 @@ ### [custom-app-5.0.1](https://github.com/truecharts/apps/compare/custom-app-4.0.54...custom-app-5.0.1) (2022-06-07) - -#### Chore - -* Auto-update chart README [skip ci] -* update docker general non-major ([#2831](https://github.com/truecharts/apps/issues/2831)) - -#### Fix - -* remove malfunctioning SCALE migration script diff --git a/stable/ddns-go/2.0.4/CONFIG.md b/stable/custom-app/5.0.9/CONFIG.md similarity index 100% rename from stable/ddns-go/2.0.4/CONFIG.md rename to stable/custom-app/5.0.9/CONFIG.md diff --git a/stable/ddns-go/2.0.4/Chart.lock b/stable/custom-app/5.0.9/Chart.lock similarity index 80% rename from stable/ddns-go/2.0.4/Chart.lock rename to stable/custom-app/5.0.9/Chart.lock index 8b2243f4797..3350bc3edf2 100644 --- a/stable/ddns-go/2.0.4/Chart.lock +++ b/stable/custom-app/5.0.9/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.0.10 digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:15:38.721587364Z" +generated: "2022-06-15T07:31:38.150915887Z" diff --git a/stable/custom-app/5.0.8/Chart.yaml b/stable/custom-app/5.0.9/Chart.yaml similarity index 94% rename from stable/custom-app/5.0.8/Chart.yaml rename to stable/custom-app/5.0.9/Chart.yaml index 48276a883f5..a7f0ddc2648 100644 --- a/stable/custom-app/5.0.8/Chart.yaml +++ b/stable/custom-app/5.0.9/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.20.1175" +appVersion: "0.20.1185" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -19,7 +19,7 @@ name: custom-app sources: - https://github.com/truecharts/apps/tree/master/charts/stable/custom-app type: application -version: 5.0.8 +version: 5.0.9 annotations: truecharts.org/catagories: | - custom diff --git a/stable/custom-app/5.0.8/README.md b/stable/custom-app/5.0.9/README.md similarity index 100% rename from stable/custom-app/5.0.8/README.md rename to stable/custom-app/5.0.9/README.md diff --git a/stable/custom-app/5.0.8/app-readme.md b/stable/custom-app/5.0.9/app-readme.md similarity index 100% rename from stable/custom-app/5.0.8/app-readme.md rename to stable/custom-app/5.0.9/app-readme.md diff --git a/stable/cyberchef/2.0.6/charts/common-10.0.10.tgz b/stable/custom-app/5.0.9/charts/common-10.0.10.tgz similarity index 100% rename from stable/cyberchef/2.0.6/charts/common-10.0.10.tgz rename to stable/custom-app/5.0.9/charts/common-10.0.10.tgz diff --git a/stable/custom-app/5.0.8/ci/test-values.yaml b/stable/custom-app/5.0.9/ci/test-values.yaml similarity index 87% rename from stable/custom-app/5.0.8/ci/test-values.yaml rename to stable/custom-app/5.0.9/ci/test-values.yaml index 92ea715ede2..49ef41ca14d 100644 --- a/stable/custom-app/5.0.8/ci/test-values.yaml +++ b/stable/custom-app/5.0.9/ci/test-values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/jackett pullPolicy: IfNotPresent - tag: v0.20.1175@sha256:13a9ab977993061452c27897bacb8ea75467a3c47f2baa66994274e10963ec43 + tag: v0.20.1185@sha256:1ed15e35561a6598e1194d1dc6f978950a2858b1636811f1edfe4b4823b15939 securityContext: readOnlyRootFilesystem: false diff --git a/stable/custom-app/5.0.8/helm-values.md b/stable/custom-app/5.0.9/helm-values.md similarity index 100% rename from stable/custom-app/5.0.8/helm-values.md rename to stable/custom-app/5.0.9/helm-values.md diff --git a/stable/custom-app/5.0.9/ix_values.yaml b/stable/custom-app/5.0.9/ix_values.yaml new file mode 100644 index 00000000000..9175ac2b2d0 --- /dev/null +++ b/stable/custom-app/5.0.9/ix_values.yaml @@ -0,0 +1,4 @@ +image: + repository: tccr.io/truecharts/jackett + pullPolicy: IfNotPresent + tag: v0.20.1185@sha256:1ed15e35561a6598e1194d1dc6f978950a2858b1636811f1edfe4b4823b15939 diff --git a/stable/custom-app/5.0.8/questions.yaml b/stable/custom-app/5.0.9/questions.yaml similarity index 100% rename from stable/custom-app/5.0.8/questions.yaml rename to stable/custom-app/5.0.9/questions.yaml diff --git a/stable/custom-app/5.0.8/security.md b/stable/custom-app/5.0.9/security.md similarity index 98% rename from stable/custom-app/5.0.8/security.md rename to stable/custom-app/5.0.9/security.md index 4f81fa4f71d..f4103b14901 100644 --- a/stable/custom-app/5.0.8/security.md +++ b/stable/custom-app/5.0.9/security.md @@ -34,7 +34,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/jackett:v0.20.1175@sha256:13a9ab977993061452c27897bacb8ea75467a3c47f2baa66994274e10963ec43 + tccr.io/truecharts/jackett:v0.20.1185@sha256:1ed15e35561a6598e1194d1dc6f978950a2858b1636811f1edfe4b4823b15939 ##### Scan Results @@ -49,18 +49,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/jackett:v0.20.1175@sha256:13a9ab977993061452c27897bacb8ea75467a3c47f2baa66994274e10963ec43 (ubuntu 20.04) +#### Container: tccr.io/truecharts/jackett:v0.20.1185@sha256:1ed15e35561a6598e1194d1dc6f978950a2858b1636811f1edfe4b4823b15939 (ubuntu 20.04) **ubuntu** @@ -70,7 +70,7 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| | curl | CVE-2022-27782 | MEDIUM | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| -| curl | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | dpkg | CVE-2022-1664 | MEDIUM | 1.19.7ubuntu3 | 1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
https://ubuntu.com/security/notices/USN-5446-1
https://ubuntu.com/security/notices/USN-5446-2
| | e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| @@ -78,7 +78,7 @@ hide: | libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| | libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libcurl4 | CVE-2022-27782 | MEDIUM | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| -| libcurl4 | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
| | libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| @@ -97,10 +97,10 @@ hide: | libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| | libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| | libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -118,17 +118,17 @@ hide: | libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| | libsqlite3-0 | CVE-2021-36690 | LOW | 3.31.1-4ubuntu0.2 | 3.31.1-4ubuntu0.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| | libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | libxml2 | CVE-2022-29824 | MEDIUM | 2.9.10+dfsg-5ubuntu0.20.04.2 | 2.9.10+dfsg-5ubuntu0.20.04.3 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| | locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| | login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2022-1292 | MEDIUM | 1.1.1f-1ubuntu2.12 | 1.1.1f-1ubuntu2.13 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| diff --git a/stable/cyberchef/2.0.6/templates/common.yaml b/stable/custom-app/5.0.9/templates/common.yaml similarity index 100% rename from stable/cyberchef/2.0.6/templates/common.yaml rename to stable/custom-app/5.0.9/templates/common.yaml diff --git a/stable/cyberchef/2.0.6/values.yaml b/stable/custom-app/5.0.9/values.yaml similarity index 100% rename from stable/cyberchef/2.0.6/values.yaml rename to stable/custom-app/5.0.9/values.yaml diff --git a/stable/cyberchef/2.0.6/CHANGELOG.md b/stable/cyberchef/2.0.7/CHANGELOG.md similarity index 91% rename from stable/cyberchef/2.0.6/CHANGELOG.md rename to stable/cyberchef/2.0.7/CHANGELOG.md index 75be8a0d84d..0aaf961ab7e 100644 --- a/stable/cyberchef/2.0.6/CHANGELOG.md +++ b/stable/cyberchef/2.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [cyberchef-2.0.7](https://github.com/truecharts/apps/compare/cyberchef-2.0.6...cyberchef-2.0.7) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [cyberchef-2.0.6](https://github.com/truecharts/apps/compare/cyberchef-2.0.5...cyberchef-2.0.6) (2022-06-14) @@ -88,12 +97,3 @@ #### Chore -* update docker general non-major ([#2817](https://github.com/truecharts/apps/issues/2817)) - - - - -### [cyberchef-1.0.29](https://github.com/truecharts/apps/compare/cyberchef-1.0.28...cyberchef-1.0.29) (2022-06-02) - -#### Chore - diff --git a/stable/budge/2.0.4/Chart.lock b/stable/cyberchef/2.0.7/Chart.lock similarity index 80% rename from stable/budge/2.0.4/Chart.lock rename to stable/cyberchef/2.0.7/Chart.lock index efd8530b48c..6a5f5ecedf2 100644 --- a/stable/budge/2.0.4/Chart.lock +++ b/stable/cyberchef/2.0.7/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.0.10 digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:12:40.801617795Z" +generated: "2022-06-15T07:31:53.063773816Z" diff --git a/stable/cyberchef/2.0.6/Chart.yaml b/stable/cyberchef/2.0.7/Chart.yaml similarity index 98% rename from stable/cyberchef/2.0.6/Chart.yaml rename to stable/cyberchef/2.0.7/Chart.yaml index 4cd9fdc07ea..699a8b7b154 100644 --- a/stable/cyberchef/2.0.6/Chart.yaml +++ b/stable/cyberchef/2.0.7/Chart.yaml @@ -17,7 +17,7 @@ maintainers: name: cyberchef sources: - https://hub.docker.com/r/mpepping/cyberchef -version: 2.0.6 +version: 2.0.7 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/cyberchef/2.0.6/README.md b/stable/cyberchef/2.0.7/README.md similarity index 100% rename from stable/cyberchef/2.0.6/README.md rename to stable/cyberchef/2.0.7/README.md diff --git a/stable/cyberchef/2.0.6/app-readme.md b/stable/cyberchef/2.0.7/app-readme.md similarity index 100% rename from stable/cyberchef/2.0.6/app-readme.md rename to stable/cyberchef/2.0.7/app-readme.md diff --git a/stable/ddns-go/2.0.4/charts/common-10.0.10.tgz b/stable/cyberchef/2.0.7/charts/common-10.0.10.tgz similarity index 100% rename from stable/ddns-go/2.0.4/charts/common-10.0.10.tgz rename to stable/cyberchef/2.0.7/charts/common-10.0.10.tgz diff --git a/stable/cyberchef/2.0.6/ix_values.yaml b/stable/cyberchef/2.0.7/ix_values.yaml similarity index 76% rename from stable/cyberchef/2.0.6/ix_values.yaml rename to stable/cyberchef/2.0.7/ix_values.yaml index 3585a574395..7243d88fbf6 100644 --- a/stable/cyberchef/2.0.6/ix_values.yaml +++ b/stable/cyberchef/2.0.7/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/cyberchef - tag: v9.39.1@sha256:22362861d085ecb6d5d6e04d9aa0c3728b1658078a52ab8e76310185795a0500 + tag: v9.39.1@sha256:404bed9a5a1c6e917f26f321cee7a9353c00713b44bea1b248a37c08b8abe424 pullPolicy: IfNotPresent securityContext: diff --git a/stable/cyberchef/2.0.6/questions.yaml b/stable/cyberchef/2.0.7/questions.yaml similarity index 100% rename from stable/cyberchef/2.0.6/questions.yaml rename to stable/cyberchef/2.0.7/questions.yaml diff --git a/stable/cyberchef/2.0.6/security.md b/stable/cyberchef/2.0.7/security.md similarity index 96% rename from stable/cyberchef/2.0.6/security.md rename to stable/cyberchef/2.0.7/security.md index e3d156fa53f..133249949f2 100644 --- a/stable/cyberchef/2.0.6/security.md +++ b/stable/cyberchef/2.0.7/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/cyberchef:v9.39.1@sha256:22362861d085ecb6d5d6e04d9aa0c3728b1658078a52ab8e76310185795a0500 + tccr.io/truecharts/cyberchef:v9.39.1@sha256:404bed9a5a1c6e917f26f321cee7a9353c00713b44bea1b248a37c08b8abe424 ##### Scan Results @@ -51,18 +51,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/cyberchef:v9.39.1@sha256:22362861d085ecb6d5d6e04d9aa0c3728b1658078a52ab8e76310185795a0500 (alpine 3.15.4) +#### Container: tccr.io/truecharts/cyberchef:v9.39.1@sha256:404bed9a5a1c6e917f26f321cee7a9353c00713b44bea1b248a37c08b8abe424 (alpine 3.15.4) **alpine** diff --git a/stable/ddns-go/2.0.4/templates/common.yaml b/stable/cyberchef/2.0.7/templates/common.yaml similarity index 100% rename from stable/ddns-go/2.0.4/templates/common.yaml rename to stable/cyberchef/2.0.7/templates/common.yaml diff --git a/stable/ddns-go/2.0.4/values.yaml b/stable/cyberchef/2.0.7/values.yaml similarity index 100% rename from stable/ddns-go/2.0.4/values.yaml rename to stable/cyberchef/2.0.7/values.yaml diff --git a/stable/ddns-go/2.0.4/CHANGELOG.md b/stable/ddns-go/2.0.5/CHANGELOG.md similarity index 91% rename from stable/ddns-go/2.0.4/CHANGELOG.md rename to stable/ddns-go/2.0.5/CHANGELOG.md index d7bbcc4c982..f2ca23757eb 100644 --- a/stable/ddns-go/2.0.4/CHANGELOG.md +++ b/stable/ddns-go/2.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ddns-go-2.0.5](https://github.com/truecharts/apps/compare/ddns-go-2.0.4...ddns-go-2.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [ddns-go-2.0.4](https://github.com/truecharts/apps/compare/ddns-go-2.0.3...ddns-go-2.0.4) (2022-06-14) @@ -88,12 +97,3 @@ - -### [ddns-go-1.0.23](https://github.com/truecharts/apps/compare/ddns-go-1.0.22...ddns-go-1.0.23) (2022-05-24) - -#### Chore - -* update helm general non-major helm releases - - - diff --git a/stable/friendica/4.0.5/CONFIG.md b/stable/ddns-go/2.0.5/CONFIG.md similarity index 100% rename from stable/friendica/4.0.5/CONFIG.md rename to stable/ddns-go/2.0.5/CONFIG.md diff --git a/stable/ddns-go/2.0.5/Chart.lock b/stable/ddns-go/2.0.5/Chart.lock new file mode 100644 index 00000000000..6fe7df482e4 --- /dev/null +++ b/stable/ddns-go/2.0.5/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:32:04.745031813Z" diff --git a/stable/ddns-go/2.0.4/Chart.yaml b/stable/ddns-go/2.0.5/Chart.yaml similarity index 95% rename from stable/ddns-go/2.0.4/Chart.yaml rename to stable/ddns-go/2.0.5/Chart.yaml index 316514ecbd2..99c18cb4439 100644 --- a/stable/ddns-go/2.0.4/Chart.yaml +++ b/stable/ddns-go/2.0.5/Chart.yaml @@ -1,8 +1,8 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: ddns-go -version: 2.0.4 -appVersion: "3.7.1" +version: 2.0.5 +appVersion: "3.7.2" description: Automatically obtain your public network IPv4 or IPv6 address and resolve it to the corresponding domain name service type: application deprecated: false diff --git a/stable/ddns-go/2.0.4/README.md b/stable/ddns-go/2.0.5/README.md similarity index 100% rename from stable/ddns-go/2.0.4/README.md rename to stable/ddns-go/2.0.5/README.md diff --git a/stable/ddns-go/2.0.4/app-readme.md b/stable/ddns-go/2.0.5/app-readme.md similarity index 100% rename from stable/ddns-go/2.0.4/app-readme.md rename to stable/ddns-go/2.0.5/app-readme.md diff --git a/stable/drawio/2.0.7/charts/common-10.0.10.tgz b/stable/ddns-go/2.0.5/charts/common-10.0.10.tgz similarity index 100% rename from stable/drawio/2.0.7/charts/common-10.0.10.tgz rename to stable/ddns-go/2.0.5/charts/common-10.0.10.tgz diff --git a/stable/ddns-go/2.0.4/helm-values.md b/stable/ddns-go/2.0.5/helm-values.md similarity index 100% rename from stable/ddns-go/2.0.4/helm-values.md rename to stable/ddns-go/2.0.5/helm-values.md diff --git a/stable/ddns-go/2.0.4/ix_values.yaml b/stable/ddns-go/2.0.5/ix_values.yaml similarity index 80% rename from stable/ddns-go/2.0.4/ix_values.yaml rename to stable/ddns-go/2.0.5/ix_values.yaml index 7026a1d5108..b007925940c 100644 --- a/stable/ddns-go/2.0.4/ix_values.yaml +++ b/stable/ddns-go/2.0.5/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/ddns-go pullPolicy: IfNotPresent - tag: v3.7.1@sha256:f847db7439b7a3ae5e096ffa2bedc33c9b0487cba19897c66920a69e7c7ce841 + tag: v3.7.2@sha256:afb718580f5221d5aa114ebc204e841aa9f9e73dd748abd8a6c7df568c452a23 securityContext: readOnlyRootFilesystem: false diff --git a/stable/ddns-go/2.0.4/questions.yaml b/stable/ddns-go/2.0.5/questions.yaml similarity index 100% rename from stable/ddns-go/2.0.4/questions.yaml rename to stable/ddns-go/2.0.5/questions.yaml diff --git a/stable/ddns-go/2.0.4/security.md b/stable/ddns-go/2.0.5/security.md similarity index 96% rename from stable/ddns-go/2.0.4/security.md rename to stable/ddns-go/2.0.5/security.md index a691548f4a7..f803fc68583 100644 --- a/stable/ddns-go/2.0.4/security.md +++ b/stable/ddns-go/2.0.5/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/ddns-go:v3.7.1@sha256:f847db7439b7a3ae5e096ffa2bedc33c9b0487cba19897c66920a69e7c7ce841 + tccr.io/truecharts/ddns-go:v3.7.2@sha256:afb718580f5221d5aa114ebc204e841aa9f9e73dd748abd8a6c7df568c452a23 ##### Scan Results @@ -51,18 +51,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/ddns-go:v3.7.1@sha256:f847db7439b7a3ae5e096ffa2bedc33c9b0487cba19897c66920a69e7c7ce841 (alpine 3.16.0) +#### Container: tccr.io/truecharts/ddns-go:v3.7.2@sha256:afb718580f5221d5aa114ebc204e841aa9f9e73dd748abd8a6c7df568c452a23 (alpine 3.16.0) **alpine** diff --git a/stable/drawio/2.0.7/templates/common.yaml b/stable/ddns-go/2.0.5/templates/common.yaml similarity index 100% rename from stable/drawio/2.0.7/templates/common.yaml rename to stable/ddns-go/2.0.5/templates/common.yaml diff --git a/stable/drawio/2.0.7/values.yaml b/stable/ddns-go/2.0.5/values.yaml similarity index 100% rename from stable/drawio/2.0.7/values.yaml rename to stable/ddns-go/2.0.5/values.yaml diff --git a/stable/drawio/2.0.7/Chart.lock b/stable/drawio/2.0.7/Chart.lock deleted file mode 100644 index df930d0b7c3..00000000000 --- a/stable/drawio/2.0.7/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:17:39.023514517Z" diff --git a/stable/drawio/2.0.7/CHANGELOG.md b/stable/drawio/2.0.8/CHANGELOG.md similarity index 91% rename from stable/drawio/2.0.7/CHANGELOG.md rename to stable/drawio/2.0.8/CHANGELOG.md index 64b72db8429..9bd1835336e 100644 --- a/stable/drawio/2.0.7/CHANGELOG.md +++ b/stable/drawio/2.0.8/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [drawio-2.0.8](https://github.com/truecharts/apps/compare/drawio-2.0.7...drawio-2.0.8) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [drawio-2.0.7](https://github.com/truecharts/apps/compare/drawio-2.0.6...drawio-2.0.7) (2022-06-14) @@ -88,12 +97,3 @@ * remove malfunctioning SCALE migration script #### Refactor - -* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - - - -### [drawio-2.0.0](https://github.com/truecharts/apps/compare/drawio-1.0.20...drawio-2.0.0) (2022-06-07) - -#### Refactor diff --git a/stable/drawio/2.0.8/Chart.lock b/stable/drawio/2.0.8/Chart.lock new file mode 100644 index 00000000000..7c54e4ec831 --- /dev/null +++ b/stable/drawio/2.0.8/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:32:15.878841088Z" diff --git a/stable/drawio/2.0.7/Chart.yaml b/stable/drawio/2.0.8/Chart.yaml similarity index 94% rename from stable/drawio/2.0.7/Chart.yaml rename to stable/drawio/2.0.8/Chart.yaml index 4536e35c98f..723e8793f3e 100644 --- a/stable/drawio/2.0.7/Chart.yaml +++ b/stable/drawio/2.0.8/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "20.0.0" +appVersion: "20.0.1" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -18,7 +18,7 @@ name: drawio sources: - https://hub.docker.com/r/jgraph/drawio - https://github.com/jgraph/drawio -version: 2.0.7 +version: 2.0.8 annotations: truecharts.org/catagories: | - media diff --git a/stable/drawio/2.0.7/README.md b/stable/drawio/2.0.8/README.md similarity index 100% rename from stable/drawio/2.0.7/README.md rename to stable/drawio/2.0.8/README.md diff --git a/stable/drawio/2.0.7/app-readme.md b/stable/drawio/2.0.8/app-readme.md similarity index 100% rename from stable/drawio/2.0.7/app-readme.md rename to stable/drawio/2.0.8/app-readme.md diff --git a/stable/fileflows/2.0.5/charts/common-10.0.10.tgz b/stable/drawio/2.0.8/charts/common-10.0.10.tgz similarity index 100% rename from stable/fileflows/2.0.5/charts/common-10.0.10.tgz rename to stable/drawio/2.0.8/charts/common-10.0.10.tgz diff --git a/stable/drawio/2.0.7/ix_values.yaml b/stable/drawio/2.0.8/ix_values.yaml similarity index 76% rename from stable/drawio/2.0.7/ix_values.yaml rename to stable/drawio/2.0.8/ix_values.yaml index 58987cefab1..b5408dff850 100644 --- a/stable/drawio/2.0.7/ix_values.yaml +++ b/stable/drawio/2.0.8/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/drawio - tag: v20.0.0@sha256:fcf9c10cdd66a52d79430e7b7c10081585ebf49edf3080335a69998d2716e62d + tag: v20.0.1@sha256:bc63dee2d457f7793494c5842593fcc2f2cbad32a63d3fb0bd41700e274c72f4 pullPolicy: IfNotPresent securityContext: diff --git a/stable/drawio/2.0.7/questions.yaml b/stable/drawio/2.0.8/questions.yaml similarity index 100% rename from stable/drawio/2.0.7/questions.yaml rename to stable/drawio/2.0.8/questions.yaml diff --git a/stable/drawio/2.0.7/security.md b/stable/drawio/2.0.8/security.md similarity index 96% rename from stable/drawio/2.0.7/security.md rename to stable/drawio/2.0.8/security.md index b5b92ba3eb3..1b0ea26c901 100644 --- a/stable/drawio/2.0.7/security.md +++ b/stable/drawio/2.0.8/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/drawio:v20.0.0@sha256:fcf9c10cdd66a52d79430e7b7c10081585ebf49edf3080335a69998d2716e62d + tccr.io/truecharts/drawio:v20.0.1@sha256:bc63dee2d457f7793494c5842593fcc2f2cbad32a63d3fb0bd41700e274c72f4 ##### Scan Results @@ -51,18 +51,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/drawio:v20.0.0@sha256:fcf9c10cdd66a52d79430e7b7c10081585ebf49edf3080335a69998d2716e62d (debian 11.3) +#### Container: tccr.io/truecharts/drawio:v20.0.1@sha256:bc63dee2d457f7793494c5842593fcc2f2cbad32a63d3fb0bd41700e274c72f4 (debian 11.3) **debian** @@ -77,8 +77,8 @@ hide: | curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| @@ -86,7 +86,7 @@ hide: | curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | e2fsprogs | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| | libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -110,8 +110,8 @@ hide: | libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| @@ -119,7 +119,7 @@ hide: | libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| | libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2+deb11u3 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| | libext2fs2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| @@ -140,8 +140,8 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -177,8 +177,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -188,10 +188,10 @@ hide: | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | logsave | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| diff --git a/stable/fileflows/2.0.5/templates/common.yaml b/stable/drawio/2.0.8/templates/common.yaml similarity index 100% rename from stable/fileflows/2.0.5/templates/common.yaml rename to stable/drawio/2.0.8/templates/common.yaml diff --git a/stable/fileflows/2.0.5/values.yaml b/stable/drawio/2.0.8/values.yaml similarity index 100% rename from stable/fileflows/2.0.5/values.yaml rename to stable/drawio/2.0.8/values.yaml diff --git a/stable/fileflows/2.0.5/Chart.lock b/stable/fileflows/2.0.5/Chart.lock deleted file mode 100644 index 9ccb70d56ff..00000000000 --- a/stable/fileflows/2.0.5/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:19:08.740223246Z" diff --git a/stable/fileflows/2.0.5/CHANGELOG.md b/stable/fileflows/2.0.6/CHANGELOG.md similarity index 90% rename from stable/fileflows/2.0.5/CHANGELOG.md rename to stable/fileflows/2.0.6/CHANGELOG.md index 59929974535..1bc034e3704 100644 --- a/stable/fileflows/2.0.5/CHANGELOG.md +++ b/stable/fileflows/2.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [fileflows-2.0.6](https://github.com/truecharts/apps/compare/fileflows-2.0.5...fileflows-2.0.6) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [fileflows-2.0.5](https://github.com/truecharts/apps/compare/fileflows-2.0.4...fileflows-2.0.5) (2022-06-14) @@ -88,12 +97,3 @@ ### [fileflows-1.0.0](https://github.com/truecharts/apps/compare/fileflows-0.0.1...fileflows-1.0.0) (2022-05-29) - -#### Feat - -* move to stable ([#2790](https://github.com/truecharts/apps/issues/2790)) - - - - -### fileflows-0.0.1 (2022-05-29) diff --git a/stable/fileflows/2.0.6/Chart.lock b/stable/fileflows/2.0.6/Chart.lock new file mode 100644 index 00000000000..05c48a58b60 --- /dev/null +++ b/stable/fileflows/2.0.6/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:32:22.325283973Z" diff --git a/stable/fileflows/2.0.5/Chart.yaml b/stable/fileflows/2.0.6/Chart.yaml similarity index 95% rename from stable/fileflows/2.0.5/Chart.yaml rename to stable/fileflows/2.0.6/Chart.yaml index 78fd6b861a8..706578fd3f2 100644 --- a/stable/fileflows/2.0.5/Chart.yaml +++ b/stable/fileflows/2.0.6/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.7.1" +appVersion: "0.8.0" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -18,7 +18,7 @@ name: fileflows sources: - https://github.com/revenz/FileFlows - https://hub.docker.com/r/revenz/fileflows -version: 2.0.5 +version: 2.0.6 annotations: truecharts.org/catagories: | - media diff --git a/stable/fileflows/2.0.5/README.md b/stable/fileflows/2.0.6/README.md similarity index 100% rename from stable/fileflows/2.0.5/README.md rename to stable/fileflows/2.0.6/README.md diff --git a/stable/fileflows/2.0.5/app-readme.md b/stable/fileflows/2.0.6/app-readme.md similarity index 100% rename from stable/fileflows/2.0.5/app-readme.md rename to stable/fileflows/2.0.6/app-readme.md diff --git a/stable/friendica/4.0.5/charts/common-10.0.10.tgz b/stable/fileflows/2.0.6/charts/common-10.0.10.tgz similarity index 100% rename from stable/friendica/4.0.5/charts/common-10.0.10.tgz rename to stable/fileflows/2.0.6/charts/common-10.0.10.tgz diff --git a/stable/fileflows/2.0.5/ix_values.yaml b/stable/fileflows/2.0.6/ix_values.yaml similarity index 85% rename from stable/fileflows/2.0.5/ix_values.yaml rename to stable/fileflows/2.0.6/ix_values.yaml index cb5d85ba5d1..4a39012004c 100644 --- a/stable/fileflows/2.0.5/ix_values.yaml +++ b/stable/fileflows/2.0.6/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/fileflows - tag: v0.7.1@sha256:40965c610f082f7a03d5a0fd5c76fad9953b89bd9eb5cfb1707660444630094c + tag: v0.8.0@sha256:d19766fc9221f31882ef911aa729ed4aa437447bd6044aaa9d557cf80245d505 pullPolicy: IfNotPresent securityContext: diff --git a/stable/fileflows/2.0.5/questions.yaml b/stable/fileflows/2.0.6/questions.yaml similarity index 100% rename from stable/fileflows/2.0.5/questions.yaml rename to stable/fileflows/2.0.6/questions.yaml diff --git a/stable/fileflows/2.0.5/security.md b/stable/fileflows/2.0.6/security.md similarity index 95% rename from stable/fileflows/2.0.5/security.md rename to stable/fileflows/2.0.6/security.md index f6c9fdfc285..67ce13bcfa1 100644 --- a/stable/fileflows/2.0.5/security.md +++ b/stable/fileflows/2.0.6/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/fileflows:v0.7.1@sha256:40965c610f082f7a03d5a0fd5c76fad9953b89bd9eb5cfb1707660444630094c + tccr.io/truecharts/fileflows:v0.8.0@sha256:d19766fc9221f31882ef911aa729ed4aa437447bd6044aaa9d557cf80245d505 ##### Scan Results @@ -51,18 +51,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/fileflows:v0.7.1@sha256:40965c610f082f7a03d5a0fd5c76fad9953b89bd9eb5cfb1707660444630094c (ubuntu 22.04) +#### Container: tccr.io/truecharts/fileflows:v0.8.0@sha256:d19766fc9221f31882ef911aa729ed4aa437447bd6044aaa9d557cf80245d505 (ubuntu 22.04) **ubuntu** @@ -71,7 +71,6 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | coreutils | CVE-2016-2781 | LOW | 8.32-4.1ubuntu1 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| -| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | 1.46.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | git | CVE-2018-1000021 | LOW | 1:2.34.1-1ubuntu1.2 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| | git-man | CVE-2018-1000021 | LOW | 1:2.34.1-1ubuntu1.2 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://access.redhat.com/security/cve/CVE-2018-1000021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| | libapparmor1 | CVE-2016-1585 | MEDIUM | 3.0.4-2ubuntu2 | |
Expand...https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1585
| @@ -83,8 +82,6 @@ hide: | libcairo2 | CVE-2017-7475 | LOW | 1.16.0-5ubuntu2 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| | libcairo2 | CVE-2018-18064 | LOW | 1.16.0-5ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-18064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libcairo2 | CVE-2019-6461 | LOW | 1.16.0-5ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
| -| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | 1.46.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | 1.46.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libflac8 | CVE-2020-0499 | LOW | 1.3.3-2build2 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-0499
https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/
https://source.android.com/security/bulletin/pixel/2020-12-01
| | libfreetype6 | CVE-2022-27404 | MEDIUM | 2.11.1+dfsg-1build1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| | libfreetype6 | CVE-2022-27405 | LOW | 2.11.1+dfsg-1build1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| @@ -96,8 +93,8 @@ hide: | libgpac11 | CVE-2018-1000100 | MEDIUM | 2.0.0+dfsg1-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000100
https://github.com/gpac/gpac/issues/994
https://ubuntu.com/security/notices/USN-3926-1
https://usn.ubuntu.com/3926-1/
| | libgpac11 | CVE-2021-28300 | MEDIUM | 2.0.0+dfsg1-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28300
https://github.com/gpac/gpac/issues/1702
| | libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1build3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://access.redhat.com/security/cve/CVE-2017-9937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libncurses6 | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-6 | |
Expand...http://www.securityfocus.com/bid/106785
https://access.redhat.com/security/cve/CVE-2019-6988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
| | libopenjp2-7 | CVE-2021-29338 | LOW | 2.4.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| | libopenjp2-7 | CVE-2021-3575 | LOW | 2.4.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3575
https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
https://ubuntu.com/security/CVE-2021-3575
| @@ -117,15 +114,13 @@ hide: | libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.37.2-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| | libsqlite3-0 | CVE-2020-9849 | LOW | 3.37.2-2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| | libsqlite3-0 | CVE-2020-9991 | LOW | 3.37.2-2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| -| libss2 | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | 1.46.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libtiff5 | CVE-2022-1354 | MEDIUM | 4.3.0-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| | libtiff5 | CVE-2018-10126 | LOW | 4.3.0-6 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libtinfo6 | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | locales | CVE-2016-20013 | LOW | 2.35-0ubuntu3 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| | login | CVE-2013-4235 | LOW | 1:4.8.1-2ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| -| logsave | CVE-2022-1304 | MEDIUM | 1.46.5-2ubuntu1 | 1.46.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| ncurses-base | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.3-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | openssh-client | CVE-2020-14145 | LOW | 1:8.9p1-3 | |
Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1
https://access.redhat.com/security/cve/CVE-2020-14145
https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145
https://docs.ssh-mitm.at/CVE-2020-14145.html
https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1
https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py
https://linux.oracle.com/cve/CVE-2020-14145.html
https://linux.oracle.com/errata/ELSA-2021-4368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14145
https://security.gentoo.org/glsa/202105-35
https://security.netapp.com/advisory/ntap-20200709-0004/
https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/
https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
| | openssh-client | CVE-2021-41617 | LOW | 1:8.9p1-3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json
https://access.redhat.com/security/cve/CVE-2021-41617
https://bugzilla.suse.com/show_bug.cgi?id=1190975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617
https://errata.almalinux.org/8/ALSA-2022-2013.html
https://linux.oracle.com/cve/CVE-2021-41617.html
https://linux.oracle.com/errata/ELSA-2022-2013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://nvd.nist.gov/vuln/detail/CVE-2021-41617
https://security.netapp.com/advisory/ntap-20211014-0004/
https://www.openssh.com/security.html
https://www.openssh.com/txt/release-8.8
https://www.openwall.com/lists/oss-security/2021/09/26/1
https://www.oracle.com/security-alerts/cpuapr2022.html
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-2ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| diff --git a/stable/grafana/4.0.7/templates/common.yaml b/stable/fileflows/2.0.6/templates/common.yaml similarity index 100% rename from stable/grafana/4.0.7/templates/common.yaml rename to stable/fileflows/2.0.6/templates/common.yaml diff --git a/stable/friendica/4.0.5/values.yaml b/stable/fileflows/2.0.6/values.yaml similarity index 100% rename from stable/friendica/4.0.5/values.yaml rename to stable/fileflows/2.0.6/values.yaml diff --git a/stable/friendica/4.0.5/CHANGELOG.md b/stable/friendica/4.0.6/CHANGELOG.md similarity index 90% rename from stable/friendica/4.0.5/CHANGELOG.md rename to stable/friendica/4.0.6/CHANGELOG.md index 97ba790089d..bab427d261c 100644 --- a/stable/friendica/4.0.5/CHANGELOG.md +++ b/stable/friendica/4.0.6/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [friendica-4.0.6](https://github.com/truecharts/apps/compare/friendica-4.0.5...friendica-4.0.6) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [friendica-4.0.5](https://github.com/truecharts/apps/compare/friendica-4.0.4...friendica-4.0.5) (2022-06-14) @@ -88,12 +97,3 @@ #### Refactor * BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - - - -### [friendica-2.0.33](https://github.com/truecharts/apps/compare/friendica-2.0.32...friendica-2.0.33) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) diff --git a/stable/grafana/4.0.7/CONFIG.md b/stable/friendica/4.0.6/CONFIG.md similarity index 100% rename from stable/grafana/4.0.7/CONFIG.md rename to stable/friendica/4.0.6/CONFIG.md diff --git a/stable/friendica/4.0.5/Chart.lock b/stable/friendica/4.0.6/Chart.lock similarity index 88% rename from stable/friendica/4.0.5/Chart.lock rename to stable/friendica/4.0.6/Chart.lock index 565f14e1401..be2e0e2e3c6 100644 --- a/stable/friendica/4.0.5/Chart.lock +++ b/stable/friendica/4.0.6/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.truecharts.org version: 3.0.7 digest: sha256:5725b1df7270e531c855e8a95d9ba6539d77af6eb88c72d4239b0d3ac16a93b3 -generated: "2022-06-14T18:54:15.157890926Z" +generated: "2022-06-15T07:32:32.131947846Z" diff --git a/stable/friendica/4.0.5/Chart.yaml b/stable/friendica/4.0.6/Chart.yaml similarity index 95% rename from stable/friendica/4.0.5/Chart.yaml rename to stable/friendica/4.0.6/Chart.yaml index 841e7889d75..b5a4b6cb22d 100644 --- a/stable/friendica/4.0.5/Chart.yaml +++ b/stable/friendica/4.0.6/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "2022.03" +appVersion: "2022.06" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -27,7 +27,7 @@ name: friendica sources: - https://friendi.ca/ - https://hub.docker.com/_/friendica -version: 4.0.5 +version: 4.0.6 annotations: truecharts.org/catagories: | - social diff --git a/stable/friendica/4.0.5/README.md b/stable/friendica/4.0.6/README.md similarity index 100% rename from stable/friendica/4.0.5/README.md rename to stable/friendica/4.0.6/README.md diff --git a/stable/friendica/4.0.5/app-readme.md b/stable/friendica/4.0.6/app-readme.md similarity index 100% rename from stable/friendica/4.0.5/app-readme.md rename to stable/friendica/4.0.6/app-readme.md diff --git a/stable/grafana/4.0.7/charts/common-10.0.10.tgz b/stable/friendica/4.0.6/charts/common-10.0.10.tgz similarity index 100% rename from stable/grafana/4.0.7/charts/common-10.0.10.tgz rename to stable/friendica/4.0.6/charts/common-10.0.10.tgz diff --git a/stable/friendica/4.0.5/charts/mariadb-3.0.7.tgz b/stable/friendica/4.0.6/charts/mariadb-3.0.7.tgz similarity index 100% rename from stable/friendica/4.0.5/charts/mariadb-3.0.7.tgz rename to stable/friendica/4.0.6/charts/mariadb-3.0.7.tgz diff --git a/stable/friendica/4.0.5/charts/redis-3.0.7.tgz b/stable/friendica/4.0.6/charts/redis-3.0.7.tgz similarity index 100% rename from stable/friendica/4.0.5/charts/redis-3.0.7.tgz rename to stable/friendica/4.0.6/charts/redis-3.0.7.tgz diff --git a/stable/friendica/4.0.5/helm-values.md b/stable/friendica/4.0.6/helm-values.md similarity index 100% rename from stable/friendica/4.0.5/helm-values.md rename to stable/friendica/4.0.6/helm-values.md diff --git a/stable/friendica/4.0.5/ix_values.yaml b/stable/friendica/4.0.6/ix_values.yaml similarity index 94% rename from stable/friendica/4.0.5/ix_values.yaml rename to stable/friendica/4.0.6/ix_values.yaml index e282fea9a2a..7afc381ee07 100644 --- a/stable/friendica/4.0.5/ix_values.yaml +++ b/stable/friendica/4.0.6/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/friendica pullPolicy: IfNotPresent - tag: v2022.03@sha256:403798c9b9d7da0b64e877770afc29f55e96fe807811d5e1c8641e876a9189c9 + tag: v2022.06@sha256:f371635ec51e7f6db126dfc94416beb8852422f88c8e7b1fc8bdc4ef7ac70cb4 securityContext: runAsNonRoot: false diff --git a/stable/friendica/4.0.5/questions.yaml b/stable/friendica/4.0.6/questions.yaml similarity index 100% rename from stable/friendica/4.0.5/questions.yaml rename to stable/friendica/4.0.6/questions.yaml diff --git a/stable/friendica/4.0.5/security.md b/stable/friendica/4.0.6/security.md similarity index 99% rename from stable/friendica/4.0.5/security.md rename to stable/friendica/4.0.6/security.md index 9f46ec317a5..3ad7745504a 100644 --- a/stable/friendica/4.0.5/security.md +++ b/stable/friendica/4.0.6/security.md @@ -78,7 +78,7 @@ hide: tccr.io/truecharts/mariadb:v10.7.4@sha256:7f7b98e81d4db5808b35a12564697818dca7f28408610f58e2fa436bbcf0fbe5 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/mariadb:v10.7.4@sha256:7f7b98e81d4db5808b35a12564697818dca7f28408610f58e2fa436bbcf0fbe5 - tccr.io/truecharts/friendica:v2022.03@sha256:403798c9b9d7da0b64e877770afc29f55e96fe807811d5e1c8641e876a9189c9 + tccr.io/truecharts/friendica:v2022.06@sha256:f371635ec51e7f6db126dfc94416beb8852422f88c8e7b1fc8bdc4ef7ac70cb4 ##### Scan Results @@ -179,10 +179,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -199,8 +199,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -208,8 +208,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -325,10 +325,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -345,8 +345,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -354,8 +354,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -471,10 +471,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -491,8 +491,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -500,8 +500,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -521,7 +521,7 @@ hide: | github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| -#### Container: tccr.io/truecharts/friendica:v2022.03@sha256:403798c9b9d7da0b64e877770afc29f55e96fe807811d5e1c8641e876a9189c9 (debian 11.3) +#### Container: tccr.io/truecharts/friendica:v2022.06@sha256:f371635ec51e7f6db126dfc94416beb8852422f88c8e7b1fc8bdc4ef7ac70cb4 (debian 11.3) **debian** @@ -529,11 +529,11 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| apache2 | CVE-2022-28614 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2 | CVE-2022-29404 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/5
https://access.redhat.com/security/cve/CVE-2022-29404
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2 | CVE-2022-31813 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/8
https://access.redhat.com/security/cve/CVE-2022-31813
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2 | CVE-2022-26377 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/2
https://access.redhat.com/security/cve/CVE-2022-26377
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377
| -| apache2 | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
| +| apache2 | CVE-2022-28614 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614
| +| apache2 | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615
| | apache2 | CVE-2022-30556 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/7
https://access.redhat.com/security/cve/CVE-2022-30556
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2 | CVE-2001-1534 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| | apache2 | CVE-2003-1307 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| @@ -544,11 +544,11 @@ hide: | apache2 | CVE-2007-3303 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| | apache2 | CVE-2008-0456 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://access.redhat.com/security/cve/CVE-2008-0456
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| | apache2 | CVE-2022-30522 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/6
https://access.redhat.com/security/cve/CVE-2022-30522
https://httpd.apache.org/security/vulnerabilities_24.html
| -| apache2-bin | CVE-2022-28614 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-bin | CVE-2022-29404 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/5
https://access.redhat.com/security/cve/CVE-2022-29404
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-bin | CVE-2022-31813 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/8
https://access.redhat.com/security/cve/CVE-2022-31813
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-bin | CVE-2022-26377 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/2
https://access.redhat.com/security/cve/CVE-2022-26377
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377
| -| apache2-bin | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
| +| apache2-bin | CVE-2022-28614 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614
| +| apache2-bin | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615
| | apache2-bin | CVE-2022-30556 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/7
https://access.redhat.com/security/cve/CVE-2022-30556
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-bin | CVE-2001-1534 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| | apache2-bin | CVE-2003-1307 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| @@ -559,11 +559,11 @@ hide: | apache2-bin | CVE-2007-3303 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| | apache2-bin | CVE-2008-0456 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://access.redhat.com/security/cve/CVE-2008-0456
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| | apache2-bin | CVE-2022-30522 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/6
https://access.redhat.com/security/cve/CVE-2022-30522
https://httpd.apache.org/security/vulnerabilities_24.html
| -| apache2-data | CVE-2022-28614 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-data | CVE-2022-29404 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/5
https://access.redhat.com/security/cve/CVE-2022-29404
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-data | CVE-2022-31813 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/8
https://access.redhat.com/security/cve/CVE-2022-31813
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-data | CVE-2022-26377 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/2
https://access.redhat.com/security/cve/CVE-2022-26377
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377
| -| apache2-data | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
| +| apache2-data | CVE-2022-28614 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614
| +| apache2-data | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615
| | apache2-data | CVE-2022-30556 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/7
https://access.redhat.com/security/cve/CVE-2022-30556
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-data | CVE-2001-1534 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| | apache2-data | CVE-2003-1307 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| @@ -574,11 +574,11 @@ hide: | apache2-data | CVE-2007-3303 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://osvdb.org/37050
http://security.psnc.pl/files/apache_report.pdf
http://securityreason.com/securityalert/2814
http://www.securityfocus.com/archive/1/469899/100/0/threaded
http://www.securityfocus.com/archive/1/471832/100/0/threaded
http://www.securityfocus.com/bid/24215
| | apache2-data | CVE-2008-0456 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://rhn.redhat.com/errata/RHSA-2013-0130.html
http://secunia.com/advisories/29348
http://secunia.com/advisories/35074
http://security.gentoo.org/glsa/glsa-200803-19.xml
http://securityreason.com/securityalert/3575
http://securitytracker.com/id?1019256
http://support.apple.com/kb/HT3549
http://www.mindedsecurity.com/MSA01150108.html
http://www.securityfocus.com/archive/1/486847/100/0/threaded
http://www.securityfocus.com/bid/27409
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/1297
https://access.redhat.com/security/cve/CVE-2008-0456
https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
https://linux.oracle.com/cve/CVE-2008-0456.html
https://linux.oracle.com/errata/ELSA-2013-0130.html
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
| | apache2-data | CVE-2022-30522 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/6
https://access.redhat.com/security/cve/CVE-2022-30522
https://httpd.apache.org/security/vulnerabilities_24.html
| -| apache2-utils | CVE-2022-28614 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-utils | CVE-2022-29404 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/5
https://access.redhat.com/security/cve/CVE-2022-29404
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-utils | CVE-2022-31813 | HIGH | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/8
https://access.redhat.com/security/cve/CVE-2022-31813
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-utils | CVE-2022-26377 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/2
https://access.redhat.com/security/cve/CVE-2022-26377
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377
| -| apache2-utils | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
| +| apache2-utils | CVE-2022-28614 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/4
https://access.redhat.com/security/cve/CVE-2022-28614
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614
| +| apache2-utils | CVE-2022-28615 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/9
https://access.redhat.com/security/cve/CVE-2022-28615
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615
| | apache2-utils | CVE-2022-30556 | MEDIUM | 2.4.53-1~deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/08/7
https://access.redhat.com/security/cve/CVE-2022-30556
https://httpd.apache.org/security/vulnerabilities_24.html
| | apache2-utils | CVE-2001-1534 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html
http://www.iss.net/security_center/static/7494.php
http://www.securityfocus.com/bid/3521
| | apache2-utils | CVE-2003-1307 | LOW | 2.4.53-1~deb11u1 | |
Expand...http://bugs.php.net/38915
http://hackerdom.ru/~dimmo/phpexpl.c
http://www.securityfocus.com/archive/1/348368
http://www.securityfocus.com/archive/1/449234/100/0/threaded
http://www.securityfocus.com/archive/1/449298/100/0/threaded
http://www.securityfocus.com/bid/9302
| @@ -871,10 +871,10 @@ hide: | libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...http://www.securityfocus.com/bid/105137
https://access.redhat.com/security/cve/CVE-2018-15607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
https://github.com/ImageMagick/ImageMagick/issues/1255
https://linux.oracle.com/cve/CVE-2018-15607.html
https://linux.oracle.com/errata/ELSA-2020-1180.html
https://ubuntu.com/security/notices/USN-4034-1
https://usn.ubuntu.com/4034-1/
| | libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20311
https://bugzilla.redhat.com/show_bug.cgi?id=1946739
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3575
https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
https://ubuntu.com/security/CVE-2021-3575
| | libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-29338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://github.com/uclouvain/openjpeg/pull/1395
https://github.com/uclouvain/openjpeg/pull/1396
https://github.com/uclouvain/openjpeg/pull/1397
https://github.com/uclouvain/openjpeg/pull/1398
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
| | libopenjp2-7 | CVE-2022-1122 | MEDIUM | 2.4.0-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1122
https://github.com/uclouvain/openjpeg/issues/1368
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIWSQFQWXDU4MT3XTVAO6HC7TVL3NHS7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RMKBAMK2CAM5TMC5TODKVCE5AAPTD5YV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/
| @@ -927,8 +927,8 @@ hide: | libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690
http://www.securityfocus.com/bid/98581
https://access.redhat.com/security/cve/CVE-2017-9117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
https://ubuntu.com/security/notices/USN-3606-1
https://usn.ubuntu.com/3606-1/
| | libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1+deb11u1 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libtiff5 | CVE-2022-1056 | LOW | 4.2.0-1+deb11u1 | |
Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
https://gitlab.com/libtiff/libtiff/-/issues/391
https://gitlab.com/libtiff/libtiff/-/merge_requests/307
https://nvd.nist.gov/vuln/detail/CVE-2022-1056
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -1030,9 +1030,9 @@ hide: | linux-libc-dev | CVE-2021-32078 | LOW | 5.10.113-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-32078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://nvd.nist.gov/vuln/detail/CVE-2021-32078
https://security.netapp.com/advisory/ntap-20210813-0002/
| | linux-libc-dev | CVE-2022-1734 | LOW | 5.10.113-1 | 5.10.120-1 |
Expand...http://www.openwall.com/lists/oss-security/2022/06/05/4
http://www.openwall.com/lists/oss-security/2022/06/09/1
https://access.redhat.com/security/cve/CVE-2022-1734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6)
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
https://nvd.nist.gov/vuln/detail/CVE-2022-1734
https://ubuntu.com/security/notices/USN-5471-1
| | linux-libc-dev | CVE-2022-25265 | LOW | 5.10.113-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-25265
https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294
https://github.com/x0reaxeax/exec-prot-bypass
https://nvd.nist.gov/vuln/detail/CVE-2022-25265
https://security.netapp.com/advisory/ntap-20220318-0005/
| +| linux-libc-dev | CVE-2022-32296 | LOW | 5.10.113-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32296
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5
| | linux-libc-dev | CVE-2022-20148 | UNKNOWN | 5.10.113-1 | |
Expand...
| -| linux-libc-dev | CVE-2022-32296 | UNKNOWN | 5.10.113-1 | |
Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5
| -| linux-libc-dev | CVE-2022-32981 | UNKNOWN | 5.10.113-1 | |
Expand...https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=8e1278444446fc97778a5e5c99bca1ce0bbc5ec9
| +| linux-libc-dev | CVE-2022-32981 | UNKNOWN | 5.10.113-1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/14/3
https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=8e1278444446fc97778a5e5c99bca1ce0bbc5ec9
| | login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| @@ -1040,10 +1040,10 @@ hide: | m4 | CVE-2008-1687 | LOW | 1.4.18-5 | |
Expand...http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/12
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.openwall.com/lists/oss-security/2008/04/07/4
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://access.redhat.com/security/cve/CVE-2008-1687
https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
| | m4 | CVE-2008-1688 | LOW | 1.4.18-5 | |
Expand...http://osvdb.org/44272
http://secunia.com/advisories/29671
http://secunia.com/advisories/29729
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
http://www.openwall.com/lists/oss-security/2008/04/07/1
http://www.openwall.com/lists/oss-security/2008/04/07/3
http://www.securityfocus.com/bid/28688
http://www.vupen.com/english/advisories/2008/1151/references
https://access.redhat.com/security/cve/CVE-2008-1688
https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| diff --git a/stable/friendica/4.0.5/templates/common.yaml b/stable/friendica/4.0.6/templates/common.yaml similarity index 100% rename from stable/friendica/4.0.5/templates/common.yaml rename to stable/friendica/4.0.6/templates/common.yaml diff --git a/stable/grafana/4.0.7/values.yaml b/stable/friendica/4.0.6/values.yaml similarity index 100% rename from stable/grafana/4.0.7/values.yaml rename to stable/friendica/4.0.6/values.yaml diff --git a/stable/grafana/4.0.7/Chart.lock b/stable/grafana/4.0.7/Chart.lock deleted file mode 100644 index e9f9a67f1d7..00000000000 --- a/stable/grafana/4.0.7/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:21:56.073745968Z" diff --git a/stable/grafana/4.0.7/CHANGELOG.md b/stable/grafana/4.0.8/CHANGELOG.md similarity index 91% rename from stable/grafana/4.0.7/CHANGELOG.md rename to stable/grafana/4.0.8/CHANGELOG.md index 7985e638731..a079aea557d 100644 --- a/stable/grafana/4.0.7/CHANGELOG.md +++ b/stable/grafana/4.0.8/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grafana-4.0.8](https://github.com/truecharts/apps/compare/grafana-4.0.7...grafana-4.0.8) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [grafana-4.0.7](https://github.com/truecharts/apps/compare/grafana-4.0.6...grafana-4.0.7) (2022-06-14) @@ -88,12 +97,3 @@ ### [grafana-3.0.62](https://github.com/truecharts/apps/compare/grafana-3.0.61...grafana-3.0.62) (2022-06-04) - -#### Chore - -* update docker general non-major ([#2826](https://github.com/truecharts/apps/issues/2826)) - - - - -### [grafana-3.0.61](https://github.com/truecharts/apps/compare/grafana-3.0.60...grafana-3.0.61) (2022-06-03) diff --git a/stable/homer/2.0.4/CONFIG.md b/stable/grafana/4.0.8/CONFIG.md similarity index 100% rename from stable/homer/2.0.4/CONFIG.md rename to stable/grafana/4.0.8/CONFIG.md diff --git a/stable/grafana/4.0.8/Chart.lock b/stable/grafana/4.0.8/Chart.lock new file mode 100644 index 00000000000..7c4bbcc0099 --- /dev/null +++ b/stable/grafana/4.0.8/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:32:28.810135054Z" diff --git a/stable/grafana/4.0.7/Chart.yaml b/stable/grafana/4.0.8/Chart.yaml similarity index 96% rename from stable/grafana/4.0.7/Chart.yaml rename to stable/grafana/4.0.8/Chart.yaml index 0c44c8d8b82..c675db41322 100644 --- a/stable/grafana/4.0.7/Chart.yaml +++ b/stable/grafana/4.0.8/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "8.5.5" +appVersion: "8.5.6" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -23,7 +23,7 @@ sources: - https://github.com/bitnami/bitnami-docker-grafana - https://grafana.com/ type: application -version: 4.0.7 +version: 4.0.8 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/grafana/4.0.7/README.md b/stable/grafana/4.0.8/README.md similarity index 100% rename from stable/grafana/4.0.7/README.md rename to stable/grafana/4.0.8/README.md diff --git a/stable/grafana/4.0.7/app-readme.md b/stable/grafana/4.0.8/app-readme.md similarity index 100% rename from stable/grafana/4.0.7/app-readme.md rename to stable/grafana/4.0.8/app-readme.md diff --git a/stable/homer/2.0.4/charts/common-10.0.10.tgz b/stable/grafana/4.0.8/charts/common-10.0.10.tgz similarity index 100% rename from stable/homer/2.0.4/charts/common-10.0.10.tgz rename to stable/grafana/4.0.8/charts/common-10.0.10.tgz diff --git a/stable/grafana/4.0.7/helm-values.md b/stable/grafana/4.0.8/helm-values.md similarity index 100% rename from stable/grafana/4.0.7/helm-values.md rename to stable/grafana/4.0.8/helm-values.md diff --git a/stable/grafana/4.0.7/ix_values.yaml b/stable/grafana/4.0.8/ix_values.yaml similarity index 95% rename from stable/grafana/4.0.7/ix_values.yaml rename to stable/grafana/4.0.8/ix_values.yaml index f37b9f7f92a..2214be4d8d6 100644 --- a/stable/grafana/4.0.7/ix_values.yaml +++ b/stable/grafana/4.0.8/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/grafana pullPolicy: IfNotPresent - tag: v8.5.5@sha256:b8feec229ac0470de1e007d7b7367c2a6076023105991e31c08c4b41edf5bf08 + tag: v8.5.6@sha256:f8c5db29e43e9d4d7c3ae03029131ac96d7ba042addeb8ea32ef6e1989e0d907 securityContext: readOnlyRootFilesystem: false diff --git a/stable/grafana/4.0.7/questions.yaml b/stable/grafana/4.0.8/questions.yaml similarity index 100% rename from stable/grafana/4.0.7/questions.yaml rename to stable/grafana/4.0.8/questions.yaml diff --git a/stable/grafana/4.0.7/security.md b/stable/grafana/4.0.8/security.md similarity index 95% rename from stable/grafana/4.0.7/security.md rename to stable/grafana/4.0.8/security.md index cd1d0b1edfb..ee73fad036d 100644 --- a/stable/grafana/4.0.7/security.md +++ b/stable/grafana/4.0.8/security.md @@ -35,7 +35,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/grafana:v8.5.5@sha256:b8feec229ac0470de1e007d7b7367c2a6076023105991e31c08c4b41edf5bf08 + tccr.io/truecharts/grafana:v8.5.6@sha256:f8c5db29e43e9d4d7c3ae03029131ac96d7ba042addeb8ea32ef6e1989e0d907 ##### Scan Results @@ -50,18 +50,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/grafana:v8.5.5@sha256:b8feec229ac0470de1e007d7b7367c2a6076023105991e31c08c4b41edf5bf08 (debian 11.3) +#### Container: tccr.io/truecharts/grafana:v8.5.6@sha256:f8c5db29e43e9d4d7c3ae03029131ac96d7ba042addeb8ea32ef6e1989e0d907 (debian 11.3) **debian** @@ -76,8 +76,8 @@ hide: | curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| @@ -85,7 +85,7 @@ hide: | curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| | libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| | libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| @@ -108,8 +108,8 @@ hide: | libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| @@ -117,7 +117,7 @@ hide: | libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| | libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2+deb11u3 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| | libfreetype6 | CVE-2022-27404 | CRITICAL | 2.10.4+dfsg-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| @@ -141,10 +141,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -163,8 +163,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -172,8 +172,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| diff --git a/stable/homer/2.0.4/templates/common.yaml b/stable/grafana/4.0.8/templates/common.yaml similarity index 100% rename from stable/homer/2.0.4/templates/common.yaml rename to stable/grafana/4.0.8/templates/common.yaml diff --git a/stable/grafana/4.0.7/templates/prometheusrules.yaml b/stable/grafana/4.0.8/templates/prometheusrules.yaml similarity index 100% rename from stable/grafana/4.0.7/templates/prometheusrules.yaml rename to stable/grafana/4.0.8/templates/prometheusrules.yaml diff --git a/stable/grafana/4.0.7/templates/servicemonitor.yaml b/stable/grafana/4.0.8/templates/servicemonitor.yaml similarity index 100% rename from stable/grafana/4.0.7/templates/servicemonitor.yaml rename to stable/grafana/4.0.8/templates/servicemonitor.yaml diff --git a/stable/homer/2.0.4/values.yaml b/stable/grafana/4.0.8/values.yaml similarity index 100% rename from stable/homer/2.0.4/values.yaml rename to stable/grafana/4.0.8/values.yaml diff --git a/stable/home-assistant/15.0.6/CHANGELOG.md b/stable/home-assistant/15.0.6/CHANGELOG.md new file mode 100644 index 00000000000..fa05cf8cda1 --- /dev/null +++ b/stable/home-assistant/15.0.6/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [home-assistant-15.0.6](https://github.com/truecharts/apps/compare/home-assistant-15.0.5...home-assistant-15.0.6) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + + +### [home-assistant-15.0.5](https://github.com/truecharts/apps/compare/home-assistant-15.0.4...home-assistant-15.0.5) (2022-06-14) + +#### Chore + +* update helm general non-major helm releases ([#2887](https://github.com/truecharts/apps/issues/2887)) + + + + +### [home-assistant-15.0.4](https://github.com/truecharts/apps/compare/home-assistant-15.0.3...home-assistant-15.0.4) (2022-06-14) + +#### Chore + +* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886)) + + + + +### [home-assistant-15.0.3](https://github.com/truecharts/apps/compare/home-assistant-15.0.2...home-assistant-15.0.3) (2022-06-11) + +#### Chore + +* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854)) + + + + +### [home-assistant-15.0.2](https://github.com/truecharts/apps/compare/home-assistant-15.0.1...home-assistant-15.0.2) (2022-06-11) + +#### Chore + +* update docker general non-major ([#2848](https://github.com/truecharts/apps/issues/2848)) + + + + +### [home-assistant-15.0.1](https://github.com/truecharts/apps/compare/home-assistant-15.0.0...home-assistant-15.0.1) (2022-06-08) + +#### Chore + +* Auto-update chart README [skip ci] +* Auto-update chart README [skip ci] +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [home-assistant-15.0.1](https://github.com/truecharts/apps/compare/home-assistant-15.0.0...home-assistant-15.0.1) (2022-06-08) + +#### Chore + +* Auto-update chart README [skip ci] +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [home-assistant-15.0.1](https://github.com/truecharts/apps/compare/home-assistant-15.0.0...home-assistant-15.0.1) (2022-06-08) + +#### Chore + +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [home-assistant-15.0.0](https://github.com/truecharts/apps/compare/home-assistant-14.0.1...home-assistant-15.0.0) (2022-06-07) + +#### Chore + +* update helm general major helm releases ([#2804](https://github.com/truecharts/apps/issues/2804)) + +#### Fix + +* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format. + + + + +### [home-assistant-14.0.1](https://github.com/truecharts/apps/compare/home-assistant-13.0.41...home-assistant-14.0.1) (2022-06-07) + +#### Chore + +* Auto-update chart README [skip ci] +* sync all apps persistence configuration and always default to PVC +* update helm general non-major helm releases ([#2838](https://github.com/truecharts/apps/issues/2838)) diff --git a/stable/ispy-agent-dvr/2.0.6/CONFIG.md b/stable/home-assistant/15.0.6/CONFIG.md similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/CONFIG.md rename to stable/home-assistant/15.0.6/CONFIG.md diff --git a/stable/mattermost/3.0.4/Chart.lock b/stable/home-assistant/15.0.6/Chart.lock similarity index 85% rename from stable/mattermost/3.0.4/Chart.lock rename to stable/home-assistant/15.0.6/Chart.lock index 2b6ef9db28d..fa26853275d 100644 --- a/stable/mattermost/3.0.4/Chart.lock +++ b/stable/home-assistant/15.0.6/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org/ version: 8.0.7 digest: sha256:2b4c13c14e572773165d89a3f24c637b85e6f0350c73bb5ee029464a014327d6 -generated: "2022-06-14T19:00:02.911621544Z" +generated: "2022-06-15T07:32:43.633723974Z" diff --git a/stable/home-assistant/15.0.6/Chart.yaml b/stable/home-assistant/15.0.6/Chart.yaml new file mode 100644 index 00000000000..76269540368 --- /dev/null +++ b/stable/home-assistant/15.0.6/Chart.yaml @@ -0,0 +1,34 @@ +apiVersion: v2 +appVersion: "2022.6.6" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +- condition: postgresql.enabled + name: postgresql + repository: https://charts.truecharts.org/ + version: 8.0.7 +deprecated: false +description: home-assistant App for TrueNAS SCALE +home: https://github.com/truecharts/apps/tree/master/charts/stable/home-assistant +icon: https://truecharts.org/_static/img/appicons/home-assistant.png +keywords: +- home-assistant +- hass +- homeassistant +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: home-assistant +sources: +- https://github.com/home-assistant/home-assistant +- https://github.com/cdr/code-server +type: application +version: 15.0.6 +annotations: + truecharts.org/catagories: | + - home-automation + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/home-assistant/15.0.6/README.md b/stable/home-assistant/15.0.6/README.md new file mode 100644 index 00000000000..e043af23f0f --- /dev/null +++ b/stable/home-assistant/15.0.6/README.md @@ -0,0 +1,39 @@ +# Introduction + +home-assistant App for TrueNAS SCALE + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://charts.truecharts.org/ | postgresql | 8.0.7 | +| https://library-charts.truecharts.org | common | 10.0.10 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/15.0.6/app-readme.md b/stable/home-assistant/15.0.6/app-readme.md new file mode 100644 index 00000000000..3f7d1730309 --- /dev/null +++ b/stable/home-assistant/15.0.6/app-readme.md @@ -0,0 +1,3 @@ +home-assistant App for TrueNAS SCALE + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/ispy-agent-dvr/2.0.6/charts/common-10.0.10.tgz b/stable/home-assistant/15.0.6/charts/common-10.0.10.tgz similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/charts/common-10.0.10.tgz rename to stable/home-assistant/15.0.6/charts/common-10.0.10.tgz diff --git a/stable/mattermost/3.0.4/charts/postgresql-8.0.7.tgz b/stable/home-assistant/15.0.6/charts/postgresql-8.0.7.tgz similarity index 100% rename from stable/mattermost/3.0.4/charts/postgresql-8.0.7.tgz rename to stable/home-assistant/15.0.6/charts/postgresql-8.0.7.tgz diff --git a/stable/home-assistant/15.0.6/helm-values.md b/stable/home-assistant/15.0.6/helm-values.md new file mode 100644 index 00000000000..3b72ecbbbce --- /dev/null +++ b/stable/home-assistant/15.0.6/helm-values.md @@ -0,0 +1,36 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| git | object | `{"deployKey":"","deployKeyBase64":""}` | hostNetwork: true # When hostNetwork is true set dnsPolicy to ClusterFirstWithHostNet dnsPolicy: ClusterFirstWithHostNet Allow access a Git repository by passing in a private SSH key | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/home-assistant"` | | +| image.tag | string | `"v2022.3.8@sha256:404205528a5f76255381cc04e89849796e25028205d494b664088e9e22054b66"` | | +| influxdb | object | `{"architecture":"standalone","authEnabled":false,"database":"home_assistant","enabled":false,"persistence":{"enabled":false}}` | ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/influxdb | +| initContainers.init.command[0] | string | `"/config/init/init.sh"` | | +| initContainers.init.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | +| initContainers.init.volumeMounts[0].mountPath | string | `"/config/init"` | | +| initContainers.init.volumeMounts[0].name | string | `"init"` | | +| initContainers.init.volumeMounts[1].mountPath | string | `"/config"` | | +| initContainers.init.volumeMounts[1].name | string | `"config"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| podSecurityContext.runAsGroup | int | `0` | | +| podSecurityContext.runAsUser | int | `0` | | +| postgresql | object | See values.yaml | Enable and configure postgresql database subchart under this key. For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) | +| prometheus.serviceMonitor.enabled | bool | `false` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| securityContext.runAsNonRoot | bool | `false` | | +| service.main.ports.main.port | int | `8123` | | +| service.main.ports.main.targetPort | int | `8123` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/home-assistant/15.0.6/ix_values.yaml b/stable/home-assistant/15.0.6/ix_values.yaml new file mode 100644 index 00000000000..6e90036dd16 --- /dev/null +++ b/stable/home-assistant/15.0.6/ix_values.yaml @@ -0,0 +1,164 @@ +image: + repository: tccr.io/truecharts/home-assistant + pullPolicy: IfNotPresent + tag: v2022.6.6@sha256:b9fbda26ab84dd00879789e95461484f2fa1e1713b10edf48b7cfe2a48b34b19 + +securityContext: + readOnlyRootFilesystem: false + runAsNonRoot: false + +podSecurityContext: + runAsUser: 0 + runAsGroup: 0 + +service: + main: + ports: + main: + port: 8123 + targetPort: 8123 + +initContainers: + init: + image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" + command: ["/config/init/init.sh"] + volumeMounts: + - name: init + mountPath: "/config/init" + - name: config + mountPath: "/config" + +# # Enable devices to be discoverable +# hostNetwork: true + +# # When hostNetwork is true set dnsPolicy to ClusterFirstWithHostNet +# dnsPolicy: ClusterFirstWithHostNet + + +# Enable a prometheus-operator servicemonitor +prometheus: + serviceMonitor: + enabled: false + # interval: 1m + # additionalLabels: {} + +persistence: + config: + enabled: true + mountPath: "/config" + init: + enabled: "true" + mountPath: "/config/init" + readOnly: true + type: "custom" + volumeSpec: + configMap: + name: '{{ include "tc.common.names.fullname" . }}-init' + defaultMode: 0777 + + +configmap: + init: + enabled: true + data: + init.sh: |- + #!/bin/sh + if test -f "/config/configuration.yaml"; then + echo "configuration.yaml exists." + if grep -q recorder: "/config/configuration.yaml"; then + echo "configuration.yaml already contains recorder" + else + cat /config/init/recorder.default >> /config/configuration.yaml + fi + if grep -q http: "/config/configuration.yaml"; then + echo "configuration.yaml already contains http section" + else + cat /config/init/http.default >> /config/configuration.yaml + fi + else + echo "configuration.yaml does NOT exist." + cp /config/init/configuration.yaml.default /config/configuration.yaml + cat /config/init/recorder.default >> /config/configuration.yaml + cat /config/init/http.default >> /config/configuration.yaml + fi + + echo "Creating include files..." + for include_file in groups.yaml automations.yaml scripts.yaml scenes.yaml; do + if test -f "/config/$include_file"; then + echo "$include_file exists." + else + echo "$include_file does NOT exist." + touch "/config/$include_file" + fi + done + + cd "/config" || echo "Could not change path to /config" + echo "Creating custom_components directory..." + mkdir "/config/custom_components" || echo "custom_components directory already exists" + + echo "Changing to the custom_components directory..." + cd "/config/custom_components" || echo "Could not change path to /config/custom_components" + + echo "Downloading HACS" + wget "https://github.com/hacs/integration/releases/latest/download/hacs.zip" || exit 0 + + if [ -d "/config/custom_components/hacs" ]; then + echo "HACS directory already exist, cleaning up..." + rm -R "/config/custom_components/hacs" + fi + + echo "Creating HACS directory..." + mkdir "/config/custom_components/hacs" + + echo "Unpacking HACS..." + unzip "/config/custom_components/hacs.zip" -d "/config/custom_components/hacs" >/dev/null 2>&1 + + echo "Removing HACS zip file..." + rm "/config/custom_components/hacs.zip" + echo "Installation complete." + + configuration.yaml.default: |- + # Configure a default setup of Home Assistant (frontend, api, etc) + default_config: + + # Text to speech + tts: + - platform: google_translate + + group: !include groups.yaml + automation: !include automations.yaml + script: !include scripts.yaml + scene: !include scenes.yaml + recorder.default: |- + + recorder: + purge_keep_days: 30 + commit_interval: 3 + db_url: {{ ( printf "%s?client_encoding=utf8" ( .Values.postgresql.url.complete | trimAll "\"" ) ) | quote }} + http.default: |- + + http: + use_x_forwarded_for: true + trusted_proxies: + - 172.16.0.0/16 + +# -- Enable and configure postgresql database subchart under this key. +# For more options see [postgresql chart documentation](https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/postgresql) +# @default -- See values.yaml +postgresql: + enabled: true + postgresqlUsername: home-assistant + postgresqlDatabase: home-assistant + existingSecret: "dbcreds" + +# Enable influxdb +# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/influxdb +influxdb: + enabled: false + architecture: standalone + database: home_assistant + authEnabled: false + persistence: + enabled: false + # storageClass: "" + # diff --git a/stable/home-assistant/15.0.6/questions.yaml b/stable/home-assistant/15.0.6/questions.yaml new file mode 100644 index 00000000000..90334d1beac --- /dev/null +++ b/stable/home-assistant/15.0.6/questions.yaml @@ -0,0 +1,2431 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 8123 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 8123 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: false + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 0 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 0 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + +# - variable: autoscaling +# group: "Advanced" +# label: "(Advanced) Horizontal Pod Autoscaler" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: target +# label: "Target" +# description: "deployment name, defaults to main deployment" +# schema: +# type: string +# default: "" +# - variable: minReplicas +# label: "Minimum Replicas" +# schema: +# type: int +# default: 1 +# - variable: maxReplicas +# label: "Maximum Replicas" +# schema: +# type: int +# default: 5 +# - variable: targetCPUUtilizationPercentage +# label: "Target CPU Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: targetMemoryUtilizationPercentage +# label: "Target Memory Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: networkPolicy +# group: "Advanced" +# label: "(Advanced) Network Policy" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: policyType +# label: "Policy Type" +# schema: +# type: string +# default: "" +# enum: +# - value: "" +# description: "Default" +# - value: "ingress" +# description: "Ingress" +# - value: "egress" +# description: "Egress" +# - value: "ingress-egress" +# description: "Ingress and Egress" +# - variable: egress +# label: "Egress" +# schema: +# type: list +# default: [] +# items: +# - variable: egressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: to +# label: "To" +# schema: +# type: list +# default: [] +# items: +# - variable: toEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" +# - variable: ingress +# label: "Ingress" +# schema: +# type: list +# default: [] +# items: +# - variable: ingressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: from +# label: "From" +# schema: +# type: list +# default: [] +# items: +# - variable: fromEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/home-assistant/15.0.6/security.md b/stable/home-assistant/15.0.6/security.md new file mode 100644 index 00000000000..267174e6708 --- /dev/null +++ b/stable/home-assistant/15.0.6/security.md @@ -0,0 +1,452 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: home-assistant/charts/postgresql/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-postgresql' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of StatefulSet 'RELEASE-NAME-postgresql' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


StatefulSet 'RELEASE-NAME-postgresql' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV011 | CPU not limited | LOW |
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW |
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.cpu'
|
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
| +| Kubernetes Security Check | KSV016 | Memory requests not specified | LOW |
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.requests.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV018 | Memory not limited | LOW |
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'resources.limits.memory'
|
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-home-assistant' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'postgresql-init' of Deployment 'RELEASE-NAME-home-assistant' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-home-assistant' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 + 'tccr.io/truecharts/home-assistant:v2022.6.6@sha256:b9fbda26ab84dd00879789e95461484f2fa1e1713b10edf48b7cfe2a48b34b19' + tccr.io/truecharts/home-assistant:v2022.6.6@sha256:b9fbda26ab84dd00879789e95461484f2fa1e1713b10edf48b7cfe2a48b34b19 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 (debian 11.3) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 (debian 11.3) + + +**debian** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| apt | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| bsdutils | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| coreutils | CVE-2016-2781 | LOW | 8.32-4 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| coreutils | CVE-2017-18018 | LOW | 8.32-4 | |
Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
| +| curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| +| libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc-l10n | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc-l10n | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc-l10n | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc-l10n | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc-l10n | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc-l10n | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc-l10n | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| libcom-err2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22945
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22945
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-22576 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27775 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27781 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27782 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| +| libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libdb5.3 | CVE-2019-8457 | CRITICAL | 5.3.28+dfsg1-0.8 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
| +| libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| +| libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4209
| +| libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 | |
Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
| +| libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 | |
Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
http://www.redhat.com/support/errata/RHSA-2005-012.html
http://www.securityfocus.com/bid/11289
http://www.trustix.org/errata/2004/0050
https://access.redhat.com/security/cve/CVE-2004-0971
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
| +| libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
| +| libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| +| libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 | |
Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2018/Dec/33
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101688
https://access.redhat.com/security/cve/CVE-2017-16231
https://bugs.exim.org/show_bug.cgi?id=2047
| +| libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 | |
Expand...http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://security.gentoo.org/glsa/201710-25
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/53de8864ba114bf6
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| +| libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| +| libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2021-3999 | HIGH | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
| +| locales | CVE-2010-4756 | LOW | 2.31-13+deb11u3 | |
Expand...http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
| +| locales | CVE-2018-20796 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| locales | CVE-2019-1010022 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
| +| locales | CVE-2019-1010023 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
| +| locales | CVE-2019-1010024 | LOW | 2.31-13+deb11u3 | |
Expand...http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
| +| locales | CVE-2019-1010025 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| +| locales | CVE-2019-9192 | LOW | 2.31-13+deb11u3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| +| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| +| openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| +| passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| +| perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| +| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| +| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| + +**jar** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://access.redhat.com/security/cve/CVE-2021-43784
https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| + + + + +#### Container: tccr.io/truecharts/home-assistant:v2022.6.6@sha256:b9fbda26ab84dd00879789e95461484f2fa1e1713b10edf48b7cfe2a48b34b19 (alpine 3.14.6) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| cups-libs | CVE-2022-26691 | MEDIUM | 2.3.3-r2 | 2.3.3-r3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
https://github.com/OpenPrinting/cups/commit/de4f8c196106033e4c372dce3e91b9d42b0b9444
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0026/MNDT-2022-0026.md
https://lists.debian.org/debian-lts-announce/2022/05/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQ6TD7F3VRITPEHFDHZHK7MU6FEBMZ5U/
https://openprinting.github.io/cups-2.4.2
https://support.apple.com/en-in/HT213183
https://support.apple.com/en-us/HT213183
https://support.apple.com/en-us/HT213184
https://support.apple.com/en-us/HT213185
https://ubuntu.com/security/notices/USN-5454-1
https://ubuntu.com/security/notices/USN-5454-2
https://www.debian.org/security/2022/dsa-5149
| +| libpq | CVE-2022-1552 | HIGH | 13.6-r0 | 13.7-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
https://errata.almalinux.org/8/ALSA-2022-4807.html
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=677a494789062ca88e0142a17bedd5415f6ab0aa (REL_14_3)
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=ab49ce7c3414ac19e4afb386d7843ce2d2fb8bda (REL_14_3)
https://linux.oracle.com/cve/CVE-2022-1552.html
https://linux.oracle.com/errata/ELSA-2022-4855.html
https://ubuntu.com/security/notices/USN-5440-1
https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
https://www.postgresql.org/support/security/CVE-2022-1552/
| +| pcre2 | CVE-2022-1586 | CRITICAL | 10.36-r0 | 10.36-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| pcre2 | CVE-2022-1587 | CRITICAL | 10.36-r0 | 10.36-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| postgresql-libs | CVE-2022-1552 | HIGH | 13.6-r0 | 13.7-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
https://errata.almalinux.org/8/ALSA-2022-4807.html
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=677a494789062ca88e0142a17bedd5415f6ab0aa (REL_14_3)
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=ab49ce7c3414ac19e4afb386d7843ce2d2fb8bda (REL_14_3)
https://linux.oracle.com/cve/CVE-2022-1552.html
https://linux.oracle.com/errata/ELSA-2022-4855.html
https://ubuntu.com/security/notices/USN-5440-1
https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
https://www.postgresql.org/support/security/CVE-2022-1552/
| + +**python-pkg** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| ujson | CVE-2021-45958 | MEDIUM | 4.3.0 | 5.1.0 |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009
https://github.com/advisories/GHSA-fh56-85cw-5pq6
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml
https://github.com/ultrajson/ultrajson/issues/501
https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284
https://github.com/ultrajson/ultrajson/pull/504
https://github.com/ultrajson/ultrajson/pull/519
https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/
https://nvd.nist.gov/vuln/detail/CVE-2021-45958
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| diff --git a/stable/home-assistant/15.0.6/templates/common.yaml b/stable/home-assistant/15.0.6/templates/common.yaml new file mode 100644 index 00000000000..b9e7208f382 --- /dev/null +++ b/stable/home-assistant/15.0.6/templates/common.yaml @@ -0,0 +1,5 @@ +{{/* Make sure all variables are set properly */}} +{{- include "tc.common.loader.init" . }} + +{{/* Render the templates */}} +{{ include "tc.common.loader.apply" . }} diff --git a/stable/ispy-agent-dvr/2.0.6/values.yaml b/stable/home-assistant/15.0.6/values.yaml similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/values.yaml rename to stable/home-assistant/15.0.6/values.yaml diff --git a/stable/homer/2.0.4/Chart.lock b/stable/homer/2.0.4/Chart.lock deleted file mode 100644 index 4fab53b7c1f..00000000000 --- a/stable/homer/2.0.4/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:23:43.603614138Z" diff --git a/stable/homer/2.0.4/CHANGELOG.md b/stable/homer/2.0.5/CHANGELOG.md similarity index 91% rename from stable/homer/2.0.4/CHANGELOG.md rename to stable/homer/2.0.5/CHANGELOG.md index 17715c64b12..ac656ccba18 100644 --- a/stable/homer/2.0.4/CHANGELOG.md +++ b/stable/homer/2.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [homer-2.0.5](https://github.com/truecharts/apps/compare/homer-2.0.4...homer-2.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [homer-2.0.4](https://github.com/truecharts/apps/compare/homer-2.0.3...homer-2.0.4) (2022-06-14) @@ -88,12 +97,3 @@ -### [homer-1.0.14](https://github.com/truecharts/apps/compare/homer-1.0.13...homer-1.0.14) (2022-05-24) - -#### Chore - -* update helm general non-major helm releases - - - - diff --git a/stable/littlelink/6.0.6/CONFIG.md b/stable/homer/2.0.5/CONFIG.md similarity index 100% rename from stable/littlelink/6.0.6/CONFIG.md rename to stable/homer/2.0.5/CONFIG.md diff --git a/stable/homer/2.0.5/Chart.lock b/stable/homer/2.0.5/Chart.lock new file mode 100644 index 00000000000..adfc02ebba0 --- /dev/null +++ b/stable/homer/2.0.5/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:33:06.641820818Z" diff --git a/stable/homer/2.0.4/Chart.yaml b/stable/homer/2.0.5/Chart.yaml similarity index 95% rename from stable/homer/2.0.4/Chart.yaml rename to stable/homer/2.0.5/Chart.yaml index bb86560e9e7..d4e73439432 100644 --- a/stable/homer/2.0.4/Chart.yaml +++ b/stable/homer/2.0.5/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "22.02.2" +appVersion: "22.06.1" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -20,7 +20,7 @@ name: homer sources: - https://github.com/bastienwirtz/homer - https://hub.docker.com/r/b4bz/homer -version: 2.0.4 +version: 2.0.5 annotations: truecharts.org/catagories: | - media diff --git a/stable/homer/2.0.4/README.md b/stable/homer/2.0.5/README.md similarity index 100% rename from stable/homer/2.0.4/README.md rename to stable/homer/2.0.5/README.md diff --git a/stable/homer/2.0.4/app-readme.md b/stable/homer/2.0.5/app-readme.md similarity index 100% rename from stable/homer/2.0.4/app-readme.md rename to stable/homer/2.0.5/app-readme.md diff --git a/stable/littlelink/6.0.6/charts/common-10.0.10.tgz b/stable/homer/2.0.5/charts/common-10.0.10.tgz similarity index 100% rename from stable/littlelink/6.0.6/charts/common-10.0.10.tgz rename to stable/homer/2.0.5/charts/common-10.0.10.tgz diff --git a/stable/homer/2.0.4/helm-values.md b/stable/homer/2.0.5/helm-values.md similarity index 100% rename from stable/homer/2.0.4/helm-values.md rename to stable/homer/2.0.5/helm-values.md diff --git a/stable/homer/2.0.4/ix_values.yaml b/stable/homer/2.0.5/ix_values.yaml similarity index 78% rename from stable/homer/2.0.4/ix_values.yaml rename to stable/homer/2.0.5/ix_values.yaml index f06a5445dc8..5931d0c9bc2 100644 --- a/stable/homer/2.0.4/ix_values.yaml +++ b/stable/homer/2.0.5/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/homer - tag: v22.02.2@sha256:0080500f803db4a6cd2b79d145fdeac54a11f0508ca25bebbe014934534a87be + tag: v22.06.1@sha256:bbde8dc3b11a98b9a41d19ead8b55e898a822ef74df097c65bb79d63d1a0f94f pullPolicy: IfNotPresent securityContext: diff --git a/stable/homer/2.0.4/questions.yaml b/stable/homer/2.0.5/questions.yaml similarity index 100% rename from stable/homer/2.0.4/questions.yaml rename to stable/homer/2.0.5/questions.yaml diff --git a/stable/homer/2.0.4/security.md b/stable/homer/2.0.5/security.md similarity index 81% rename from stable/homer/2.0.4/security.md rename to stable/homer/2.0.5/security.md index ce5383bf2db..330a4306b0d 100644 --- a/stable/homer/2.0.4/security.md +++ b/stable/homer/2.0.5/security.md @@ -35,7 +35,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/homer:v22.02.2@sha256:0080500f803db4a6cd2b79d145fdeac54a11f0508ca25bebbe014934534a87be + tccr.io/truecharts/homer:v22.06.1@sha256:bbde8dc3b11a98b9a41d19ead8b55e898a822ef74df097c65bb79d63d1a0f94f ##### Scan Results @@ -50,22 +50,24 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/homer:v22.02.2@sha256:0080500f803db4a6cd2b79d145fdeac54a11f0508ca25bebbe014934534a87be (alpine 3.15.4) +#### Container: tccr.io/truecharts/homer:v22.06.1@sha256:bbde8dc3b11a98b9a41d19ead8b55e898a822ef74df097c65bb79d63d1a0f94f (alpine 3.16.0) **alpine** -| No Vulnerabilities found | -|:---------------------------------| +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| pcre2 | CVE-2022-1586 | CRITICAL | 10.39-r0 | 10.40-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| pcre2 | CVE-2022-1587 | CRITICAL | 10.39-r0 | 10.40-r0 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| diff --git a/stable/ispy-agent-dvr/2.0.6/templates/common.yaml b/stable/homer/2.0.5/templates/common.yaml similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/templates/common.yaml rename to stable/homer/2.0.5/templates/common.yaml diff --git a/stable/littlelink/6.0.6/values.yaml b/stable/homer/2.0.5/values.yaml similarity index 100% rename from stable/littlelink/6.0.6/values.yaml rename to stable/homer/2.0.5/values.yaml diff --git a/stable/ispy-agent-dvr/2.0.6/Chart.lock b/stable/ispy-agent-dvr/2.0.6/Chart.lock deleted file mode 100644 index 60c3bddc74a..00000000000 --- a/stable/ispy-agent-dvr/2.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:24:52.117497831Z" diff --git a/stable/ispy-agent-dvr/2.0.6/CHANGELOG.md b/stable/ispy-agent-dvr/2.0.7/CHANGELOG.md similarity index 91% rename from stable/ispy-agent-dvr/2.0.6/CHANGELOG.md rename to stable/ispy-agent-dvr/2.0.7/CHANGELOG.md index bc87a94edf7..c367ad80725 100644 --- a/stable/ispy-agent-dvr/2.0.6/CHANGELOG.md +++ b/stable/ispy-agent-dvr/2.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ispy-agent-dvr-2.0.7](https://github.com/truecharts/apps/compare/ispy-agent-dvr-2.0.6...ispy-agent-dvr-2.0.7) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [ispy-agent-dvr-2.0.6](https://github.com/truecharts/apps/compare/ispy-agent-dvr-2.0.5...ispy-agent-dvr-2.0.6) (2022-06-14) @@ -88,12 +97,3 @@ ### [ispy-agent-dvr-2.0.0](https://github.com/truecharts/apps/compare/ispy-agent-dvr-1.0.28...ispy-agent-dvr-2.0.0) (2022-06-07) -#### Chore - -* sync all apps persistence configuration and always default to PVC - -#### Refactor - -* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - diff --git a/stable/n8n/4.0.6/CONFIG.md b/stable/ispy-agent-dvr/2.0.7/CONFIG.md similarity index 100% rename from stable/n8n/4.0.6/CONFIG.md rename to stable/ispy-agent-dvr/2.0.7/CONFIG.md diff --git a/stable/ispy-agent-dvr/2.0.7/Chart.lock b/stable/ispy-agent-dvr/2.0.7/Chart.lock new file mode 100644 index 00000000000..7acfaee857d --- /dev/null +++ b/stable/ispy-agent-dvr/2.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:33:13.216769909Z" diff --git a/stable/ispy-agent-dvr/2.0.6/Chart.yaml b/stable/ispy-agent-dvr/2.0.7/Chart.yaml similarity index 95% rename from stable/ispy-agent-dvr/2.0.6/Chart.yaml rename to stable/ispy-agent-dvr/2.0.7/Chart.yaml index 87ff341ed62..557cc630bf5 100644 --- a/stable/ispy-agent-dvr/2.0.6/Chart.yaml +++ b/stable/ispy-agent-dvr/2.0.7/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "4.0.4.0" +appVersion: "4.0.5.0" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -20,7 +20,7 @@ name: ispy-agent-dvr sources: - https://hub.docker.com/r/doitandbedone/ispyagentdvr - https://github.com/doitandbedone/ispyagentdvr-docker -version: 2.0.6 +version: 2.0.7 annotations: truecharts.org/catagories: | - security diff --git a/stable/ispy-agent-dvr/2.0.6/README.md b/stable/ispy-agent-dvr/2.0.7/README.md similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/README.md rename to stable/ispy-agent-dvr/2.0.7/README.md diff --git a/stable/ispy-agent-dvr/2.0.6/app-readme.md b/stable/ispy-agent-dvr/2.0.7/app-readme.md similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/app-readme.md rename to stable/ispy-agent-dvr/2.0.7/app-readme.md diff --git a/stable/mattermost/3.0.4/charts/common-10.0.10.tgz b/stable/ispy-agent-dvr/2.0.7/charts/common-10.0.10.tgz similarity index 100% rename from stable/mattermost/3.0.4/charts/common-10.0.10.tgz rename to stable/ispy-agent-dvr/2.0.7/charts/common-10.0.10.tgz diff --git a/stable/ispy-agent-dvr/2.0.6/helm-values.md b/stable/ispy-agent-dvr/2.0.7/helm-values.md similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/helm-values.md rename to stable/ispy-agent-dvr/2.0.7/helm-values.md diff --git a/stable/ispy-agent-dvr/2.0.6/ix_values.yaml b/stable/ispy-agent-dvr/2.0.7/ix_values.yaml similarity index 95% rename from stable/ispy-agent-dvr/2.0.6/ix_values.yaml rename to stable/ispy-agent-dvr/2.0.7/ix_values.yaml index 3e074caec15..348e00a2384 100644 --- a/stable/ispy-agent-dvr/2.0.6/ix_values.yaml +++ b/stable/ispy-agent-dvr/2.0.7/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/ispy-agent-dvr - tag: v4.0.4.0@sha256:5e0c32708f462e1bc5a597652d2e8aa41b6e60fe0e35867db223d33fcfc2fcbd + tag: v4.0.5.0@sha256:4f4979e8348abff395cbf6085be9ff8c725582960e5d5c1aa8615c4aa207b409 pullPolicy: IfNotPresent securityContext: diff --git a/stable/ispy-agent-dvr/2.0.6/questions.yaml b/stable/ispy-agent-dvr/2.0.7/questions.yaml similarity index 100% rename from stable/ispy-agent-dvr/2.0.6/questions.yaml rename to stable/ispy-agent-dvr/2.0.7/questions.yaml diff --git a/stable/ispy-agent-dvr/2.0.6/security.md b/stable/ispy-agent-dvr/2.0.7/security.md similarity index 95% rename from stable/ispy-agent-dvr/2.0.6/security.md rename to stable/ispy-agent-dvr/2.0.7/security.md index 8a1da9b6316..005fa3db2b6 100644 --- a/stable/ispy-agent-dvr/2.0.6/security.md +++ b/stable/ispy-agent-dvr/2.0.7/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/ispy-agent-dvr:v4.0.4.0@sha256:5e0c32708f462e1bc5a597652d2e8aa41b6e60fe0e35867db223d33fcfc2fcbd + tccr.io/truecharts/ispy-agent-dvr:v4.0.5.0@sha256:4f4979e8348abff395cbf6085be9ff8c725582960e5d5c1aa8615c4aa207b409 ##### Scan Results @@ -51,18 +51,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/ispy-agent-dvr:v4.0.4.0@sha256:5e0c32708f462e1bc5a597652d2e8aa41b6e60fe0e35867db223d33fcfc2fcbd (ubuntu 18.04) +#### Container: tccr.io/truecharts/ispy-agent-dvr:v4.0.5.0@sha256:4f4979e8348abff395cbf6085be9ff8c725582960e5d5c1aa8615c4aa207b409 (ubuntu 18.04) **ubuntu** @@ -74,8 +74,8 @@ hide: | bash | CVE-2019-18276 | LOW | 4.4.18-2ubuntu1.2 | 4.4.18-2ubuntu1.3 |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
| | coreutils | CVE-2016-2781 | LOW | 8.28-1ubuntu1 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| | curl | CVE-2021-22876 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.13 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
| -| curl | CVE-2021-22924 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22925 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22924 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| curl | CVE-2021-22925 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22946 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.15 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22947 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.15 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2022-22576 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| @@ -83,7 +83,7 @@ hide: | curl | CVE-2022-27782 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | curl | CVE-2021-22898 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | curl | CVE-2022-27776 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27781 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27781 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | dpkg | CVE-2022-1664 | MEDIUM | 1.19.0.5ubuntu2.3 | 1.19.0.5ubuntu2.4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
https://ubuntu.com/security/notices/USN-5446-1
https://ubuntu.com/security/notices/USN-5446-2
| | e2fsprogs | CVE-2022-1304 | MEDIUM | 1.44.1-1ubuntu1.3 | 1.44.1-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | ffmpeg | CVE-2020-20891 | MEDIUM | 7:4.3.2-0york0~18.04 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20891
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/64a805883d7223c868a683f0030837d859edd2ab
https://trac.ffmpeg.org/ticket/8282
| @@ -237,8 +237,8 @@ hide: | libcroco3 | CVE-2017-8871 | LOW | 0.6.12-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
http://seclists.org/fulldisclosure/2017/Jun/10
http://www.openwall.com/lists/oss-security/2020/08/13/3
https://access.redhat.com/security/cve/CVE-2017-8871
https://bugzilla.gnome.org/show_bug.cgi?id=782649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871
https://ubuntu.com/security/notices/USN-5389-1
https://www.exploit-db.com/exploits/42147/
| | libcroco3 | CVE-2020-12825 | LOW | 0.6.12-2 | |
Expand...http://www.openwall.com/lists/oss-security/2020/08/13/3
http://www.openwall.com/lists/oss-security/2020/09/08/3
https://access.redhat.com/security/cve/CVE-2020-12825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825
https://errata.almalinux.org/8/ALSA-2020-3654.html
https://gitlab.gnome.org/GNOME/libcroco/-/issues/8
https://linux.oracle.com/cve/CVE-2020-12825.html
https://linux.oracle.com/errata/ELSA-2020-4072.html
https://ubuntu.com/security/notices/USN-5389-1
| | libcurl4 | CVE-2021-22876 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.13 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.oracle.com//security-alerts/cpujul2021.html
| -| libcurl4 | CVE-2021-22924 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl4 | CVE-2021-22925 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22924 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libcurl4 | CVE-2021-22925 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22946 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.15 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22947 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.15 |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2022-22576 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| @@ -246,7 +246,7 @@ hide: | libcurl4 | CVE-2022-27782 | MEDIUM | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | libcurl4 | CVE-2021-22898 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.14 |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libcurl4 | CVE-2022-27776 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl4 | CVE-2022-27781 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27781 | LOW | 7.58.0-2ubuntu3.12 | 7.58.0-2ubuntu3.18 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| | libext2fs2 | CVE-2022-1304 | MEDIUM | 1.44.1-1ubuntu1.3 | 1.44.1-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libflac8 | CVE-2020-0499 | LOW | 1.3.2-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-0499
https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/
https://source.android.com/security/bulletin/pixel/2020-12-01
| | libfreetype6 | CVE-2022-27404 | MEDIUM | 2.8.1-2ubuntu2.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| @@ -323,14 +323,14 @@ hide: | libmysofa1 | CVE-2019-20063 | MEDIUM | 1.0~dfsg0-2~18.04.york0 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20063
https://github.com/hoene/libmysofa/commit/ecb7b743b6f6d47b93a7bc680a60071a0f9524c6
https://github.com/hoene/libmysofa/compare/v0.7...v0.8
https://github.com/hoene/libmysofa/issues/67
| | libmysofa1 | CVE-2020-6860 | MEDIUM | 1.0~dfsg0-2~18.04.york0 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6860
https://github.com/hoene/libmysofa/commit/c31120a4ddfe3fc705cfdd74da7e884e1866da85
https://github.com/hoene/libmysofa/issues/96
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/
| | libmysofa1 | CVE-2021-3756 | MEDIUM | 1.0~dfsg0-2~18.04.york0 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3756
https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1
https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1 (v1.2.1)
https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1
https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/
| -| libncurses5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| libncurses5 | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncurses5 | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| libncursesw5 | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw5 | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses5 | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses5 | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw5 | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw5 | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libnettle6 | CVE-2021-20305 | MEDIUM | 3.4-1 | 3.4-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-20305
https://bugzilla.redhat.com/show_bug.cgi?id=1942533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
https://linux.oracle.com/cve/CVE-2021-20305.html
https://linux.oracle.com/errata/ELSA-2021-1206.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/
https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
https://security.gentoo.org/glsa/202105-31
https://security.netapp.com/advisory/ntap-20211022-0002/
https://ubuntu.com/security/notices/USN-4906-1
https://www.debian.org/security/2021/dsa-4933
| | libnettle6 | CVE-2021-3580 | MEDIUM | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
| | libnettle6 | CVE-2018-16869 | LOW | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 |
Expand...http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://access.redhat.com/security/cve/CVE-2018-16869
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://ubuntu.com/security/notices/USN-4990-1
| @@ -409,7 +409,7 @@ hide: | libss2 | CVE-2022-1304 | MEDIUM | 1.44.1-1ubuntu1.3 | 1.44.1-1ubuntu1.4 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libssl1.1 | CVE-2021-3449 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.9 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://access.redhat.com/security/cve/CVE-2021-3449
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3449.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://rustsec.org/advisories/RUSTSEC-2021-0055.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://ubuntu.com/security/notices/USN-4891-1
https://ubuntu.com/security/notices/USN-5038-1
https://www.debian.org/security/2021/dsa-4875
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-06
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| | libssl1.1 | CVE-2021-3711 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/security/cve/CVE-2021-3711
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-3711
https://rustsec.org/advisories/RUSTSEC-2021-0097.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| -| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.15 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| +| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.15 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| | libssl1.1 | CVE-2021-23841 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.8 |
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
| | libssl1.1 | CVE-2021-3712 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| | libssl1.1 | CVE-2022-1292 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| @@ -445,18 +445,18 @@ hide: | libswscale5 | CVE-2021-3566 | MEDIUM | 7:4.3.2-0york0~18.04 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3566
https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html
| | libswscale5 | CVE-2020-20451 | LOW | 7:4.3.2-0york0~18.04 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
| | libswscale5 | CVE-2020-20902 | LOW | 7:4.3.2-0york0~18.04 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902
https://trac.ffmpeg.org/ticket/8176
| -| libsystemd0 | CVE-2021-33910 | HIGH | 237-3ubuntu10.43 | 237-3ubuntu10.49 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| libsystemd0 | CVE-2021-33910 | HIGH | 237-3ubuntu10.43 | 237-3ubuntu10.49 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| | libsystemd0 | CVE-2020-13529 | LOW | 237-3ubuntu10.43 | 237-3ubuntu10.49 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libtiff5 | CVE-2022-1354 | MEDIUM | 4.0.9-5ubuntu0.5 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| | libtiff5 | CVE-2018-10126 | LOW | 4.0.9-5ubuntu0.5 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libtiff5 | CVE-2020-19131 | LOW | 4.0.9-5ubuntu0.5 | |
Expand...http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/
http://bugzilla.maptools.org/show_bug.cgi?id=2831
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19131.json
https://access.redhat.com/security/cve/CVE-2020-19131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131
https://errata.almalinux.org/8/ALSA-2022-1810.html
https://linux.oracle.com/cve/CVE-2020-19131.html
https://linux.oracle.com/errata/ELSA-2022-1810.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
| | libtiff5 | CVE-2020-19144 | LOW | 4.0.9-5ubuntu0.5 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2852
https://access.redhat.com/security/cve/CVE-2020-19144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19144
https://gitlab.com/libtiff/libtiff/-/issues/159
https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
https://security.netapp.com/advisory/ntap-20211004-0005/
| | libtiff5 | CVE-2022-22844 | LOW | 4.0.9-5ubuntu0.5 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| -| libtinfo5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| libtinfo5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| libtinfo5 | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libtinfo5 | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libudev1 | CVE-2021-33910 | HIGH | 237-3ubuntu10.43 | 237-3ubuntu10.49 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| +| libtinfo5 | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo5 | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo5 | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libudev1 | CVE-2021-33910 | HIGH | 237-3ubuntu10.43 | 237-3ubuntu10.49 |
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
| | libudev1 | CVE-2020-13529 | LOW | 237-3ubuntu10.43 | 237-3ubuntu10.49 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libvorbis0a | CVE-2017-14160 | LOW | 1.3.5-4.2 | |
Expand...http://openwall.com/lists/oss-security/2017/09/21/2
http://www.openwall.com/lists/oss-security/2017/09/21/2
http://www.openwall.com/lists/oss-security/2017/09/21/3
http://www.securityfocus.com/bid/101045
https://access.redhat.com/security/cve/CVE-2017-14160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160
https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html
https://security.gentoo.org/glsa/202003-36
https://ubuntu.com/security/notices/USN-5420-1
| | libvorbis0a | CVE-2018-10392 | LOW | 1.3.5-4.2 | |
Expand...https://access.redhat.com/errata/RHSA-2019:3703
https://access.redhat.com/security/cve/CVE-2018-10392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392
https://gitlab.xiph.org/xiph/vorbis/issues/2335
https://linux.oracle.com/cve/CVE-2018-10392.html
https://linux.oracle.com/errata/ELSA-2019-3703.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2018-10392
https://security.gentoo.org/glsa/202003-36
https://ubuntu.com/security/notices/USN-5420-1
| @@ -509,7 +509,7 @@ hide: | linux-libc-dev | CVE-2022-0812 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0812
https://bugzilla.redhat.com/show_bug.cgi?id=2058361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
https://twitter.com/iMilnb/status/1497125078252806161
| | linux-libc-dev | CVE-2022-0998 | MEDIUM | 4.15.0-184.194 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/02/1
https://access.redhat.com/security/cve/CVE-2022-0998
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0998
https://security.netapp.com/advisory/ntap-20220513-0003/
| | linux-libc-dev | CVE-2022-1012 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
https://git.kernel.org/linus/b2d057560b8107c633b39aabe517ff9d93f285e3 (5.18-rc6)
https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/
https://ubuntu.com/security/notices/USN-5471-1
| -| linux-libc-dev | CVE-2022-1048 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| +| linux-libc-dev | CVE-2022-1048 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://linux.oracle.com/cve/CVE-2022-1048.html
https://linux.oracle.com/errata/ELSA-2022-9480.html
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| | linux-libc-dev | CVE-2022-1195 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2056381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
| | linux-libc-dev | CVE-2022-1199 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809
https://github.com/torvalds/linux/commit/71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac
https://github.com/torvalds/linux/commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10
https://marc.info/?l=oss-security&m=164888973827435
https://ubuntu.com/security/notices/USN-5469-1
| | linux-libc-dev | CVE-2022-1204 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
https://github.com/torvalds/linux/commit/5352a761308397a0e6250fdc629bb3f615b94747
https://github.com/torvalds/linux/commit/87563a043cef044fed5db7967a75741cc16ad2b1
https://github.com/torvalds/linux/commit/9fd75b66b8f68498454d685dc4ba13192ae069b0
https://github.com/torvalds/linux/commit/d01ffb9eee4af165d83b08dd73ebdf9fe94a519b
https://github.com/torvalds/linux/commit/feef318c855a361a1eccd880f33e88c460eb63b4
https://marc.info/?i=20c5f3a.325bc.17fe90c96f4.Coremail.duoming@zju.edu.cn
https://ubuntu.com/security/notices/USN-5469-1
https://www.openwall.com/lists/oss-security/2022/04/02/2
| @@ -518,9 +518,9 @@ hide: | linux-libc-dev | CVE-2022-1508 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
| | linux-libc-dev | CVE-2022-1652 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1652
https://bugzilla.redhat.com/show_bug.cgi?id=1832397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
https://francozappa.github.io/about-bias/
https://kb.cert.org/vuls/id/647177/
https://nvd.nist.gov/vuln/detail/CVE-2022-1652
https://www.openwall.com/lists/oss-security/2022/05/10/1
https://www.openwall.com/lists/oss-security/2022/05/10/2
| | linux-libc-dev | CVE-2022-1734 | MEDIUM | 4.15.0-184.194 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/05/4
http://www.openwall.com/lists/oss-security/2022/06/09/1
https://access.redhat.com/security/cve/CVE-2022-1734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6)
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
https://nvd.nist.gov/vuln/detail/CVE-2022-1734
https://ubuntu.com/security/notices/USN-5471-1
| -| linux-libc-dev | CVE-2022-1786 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1786
https://bugzilla.redhat.com/show_bug.cgi?id=2087760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=29f077d070519a88a793fbc70f1e6484dc6d9e35
https://linux.oracle.com/cve/CVE-2022-1786.html
https://linux.oracle.com/errata/ELSA-2022-9426.html
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/24/4
| +| linux-libc-dev | CVE-2022-1786 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1786
https://bugzilla.redhat.com/show_bug.cgi?id=2087760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=29f077d070519a88a793fbc70f1e6484dc6d9e35
https://linux.oracle.com/cve/CVE-2022-1786.html
https://linux.oracle.com/errata/ELSA-2022-9426.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1786
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/24/4
| | linux-libc-dev | CVE-2022-1836 | MEDIUM | 4.15.0-184.194 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1836
https://git.kernel.org/linus/233087ca063686964a53c829d547c7571e3f67bf (5.18-rc5)
https://github.com/torvalds/linux/commit/233087ca063686964a53c829d547c7571e3f67bf
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://www.openwall.com/lists/oss-security/2022/04/28/1
| -| linux-libc-dev | CVE-2022-23041 | MEDIUM | 4.15.0-184.194 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| +| linux-libc-dev | CVE-2022-23041 | MEDIUM | 4.15.0-184.194 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://linux.oracle.com/cve/CVE-2022-23041.html
https://linux.oracle.com/errata/ELSA-2022-9480.html
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| | linux-libc-dev | CVE-2016-10723 | LOW | 4.15.0-184.194 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723
https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
https://patchwork.kernel.org/patch/10395909/
https://patchwork.kernel.org/patch/9842889/
https://www.spinics.net/lists/linux-mm/msg117896.html
| | linux-libc-dev | CVE-2017-0537 | LOW | 4.15.0-184.194 | |
Expand...http://www.securityfocus.com/bid/96831
http://www.securitytracker.com/id/1037968
https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537
https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t
https://source.android.com/security/bulletin/2017-01-01.html
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
| | linux-libc-dev | CVE-2017-13165 | LOW | 4.15.0-184.194 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165
https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a
https://source.android.com/security/bulletin/pixel/2017-12-01
| @@ -556,17 +556,17 @@ hide: | multiarch-support | CVE-2015-8985 | LOW | 2.27-3ubuntu1.6 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | multiarch-support | CVE-2016-10739 | LOW | 2.27-3ubuntu1.6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
http://www.securityfocus.com/bid/106672
https://access.redhat.com/errata/RHSA-2019:2118
https://access.redhat.com/errata/RHSA-2019:3513
https://access.redhat.com/security/cve/CVE-2016-10739
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://linux.oracle.com/cve/CVE-2016-10739.html
https://linux.oracle.com/errata/ELSA-2019-3513.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10739
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
| | multiarch-support | CVE-2016-20013 | LOW | 2.27-3ubuntu1.6 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| -| ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| ncurses-base | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-base | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| ncurses-bin | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2021-3449 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.9 |
Expand...http://www.openwall.com/lists/oss-security/2021/03/27/1
http://www.openwall.com/lists/oss-security/2021/03/27/2
http://www.openwall.com/lists/oss-security/2021/03/28/3
http://www.openwall.com/lists/oss-security/2021/03/28/4
https://access.redhat.com/security/cve/CVE-2021-3449
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
https://kc.mcafee.com/corporate/index?page=content&id=SB10356
https://linux.oracle.com/cve/CVE-2021-3449.html
https://linux.oracle.com/errata/ELSA-2021-9151.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
https://rustsec.org/advisories/RUSTSEC-2021-0055.html
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210326-0006/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
https://ubuntu.com/security/notices/USN-4891-1
https://ubuntu.com/security/notices/USN-5038-1
https://www.debian.org/security/2021/dsa-4875
https://www.openssl.org/news/secadv/20210325.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-05
https://www.tenable.com/security/tns-2021-06
https://www.tenable.com/security/tns-2021-09
https://www.tenable.com/security/tns-2021-10
| | openssl | CVE-2021-3711 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/security/cve/CVE-2021-3711
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-3711
https://rustsec.org/advisories/RUSTSEC-2021-0097.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| -| openssl | CVE-2022-0778 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.15 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| +| openssl | CVE-2022-0778 | HIGH | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.15 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| | openssl | CVE-2021-23841 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.8 |
Expand...http://seclists.org/fulldisclosure/2021/May/67
http://seclists.org/fulldisclosure/2021/May/68
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2021-23841
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
https://linux.oracle.com/cve/CVE-2021-23841.html
https://linux.oracle.com/errata/ELSA-2021-9561.html
https://rustsec.org/advisories/RUSTSEC-2021-0058.html
https://security.gentoo.org/glsa/202103-03
https://security.netapp.com/advisory/ntap-20210219-0009/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://support.apple.com/kb/HT212528
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212534
https://ubuntu.com/security/notices/USN-4738-1
https://ubuntu.com/security/notices/USN-4745-1
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20210216.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-03
https://www.tenable.com/security/tns-2021-09
| | openssl | CVE-2021-3712 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.13 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
| | openssl | CVE-2022-1292 | MEDIUM | 1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.17 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| diff --git a/stable/mattermost/3.0.4/templates/common.yaml b/stable/ispy-agent-dvr/2.0.7/templates/common.yaml similarity index 100% rename from stable/mattermost/3.0.4/templates/common.yaml rename to stable/ispy-agent-dvr/2.0.7/templates/common.yaml diff --git a/stable/mattermost/3.0.4/values.yaml b/stable/ispy-agent-dvr/2.0.7/values.yaml similarity index 100% rename from stable/mattermost/3.0.4/values.yaml rename to stable/ispy-agent-dvr/2.0.7/values.yaml diff --git a/stable/jackett/11.0.9/CHANGELOG.md b/stable/jackett/11.0.9/CHANGELOG.md new file mode 100644 index 00000000000..1e187def289 --- /dev/null +++ b/stable/jackett/11.0.9/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [jackett-11.0.9](https://github.com/truecharts/apps/compare/jackett-11.0.8...jackett-11.0.9) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + + +### [jackett-11.0.8](https://github.com/truecharts/apps/compare/jackett-11.0.7...jackett-11.0.8) (2022-06-14) + +#### Chore + +* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886)) + + + + +### [jackett-11.0.7](https://github.com/truecharts/apps/compare/jackett-11.0.6...jackett-11.0.7) (2022-06-14) + +#### Chore + +* update docker general non-major ([#2872](https://github.com/truecharts/apps/issues/2872)) + + + + +### [jackett-11.0.6](https://github.com/truecharts/apps/compare/jackett-11.0.5...jackett-11.0.6) (2022-06-11) + +#### Chore + +* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854)) +* update docker general non-major ([#2856](https://github.com/truecharts/apps/issues/2856)) + + + + +### [jackett-11.0.5](https://github.com/truecharts/apps/compare/jackett-11.0.4...jackett-11.0.5) (2022-06-11) + +#### Chore + +* update docker general non-major ([#2848](https://github.com/truecharts/apps/issues/2848)) + + + + +### [jackett-11.0.4](https://github.com/truecharts/apps/compare/jackett-11.0.3...jackett-11.0.4) (2022-06-09) + +#### Chore + +* update docker general non-major ([#2846](https://github.com/truecharts/apps/issues/2846)) + + + + +### [jackett-11.0.3](https://github.com/truecharts/apps/compare/jackett-11.0.2...jackett-11.0.3) (2022-06-08) + +#### Chore + +* Auto-update chart README [skip ci] +* Auto-update chart README [skip ci] +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [jackett-11.0.3](https://github.com/truecharts/apps/compare/jackett-11.0.2...jackett-11.0.3) (2022-06-08) + +#### Chore + +* Auto-update chart README [skip ci] +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [jackett-11.0.3](https://github.com/truecharts/apps/compare/jackett-11.0.2...jackett-11.0.3) (2022-06-08) + +#### Chore + +* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) + + + + +### [jackett-11.0.2](https://github.com/truecharts/apps/compare/jackett-11.0.1...jackett-11.0.2) (2022-06-07) + +#### Fix + +* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format. + + + + +### [jackett-11.0.1](https://github.com/truecharts/apps/compare/jackett-10.0.54...jackett-11.0.1) (2022-06-07) diff --git a/stable/omada-controller/6.0.8/CONFIG.md b/stable/jackett/11.0.9/CONFIG.md similarity index 100% rename from stable/omada-controller/6.0.8/CONFIG.md rename to stable/jackett/11.0.9/CONFIG.md diff --git a/stable/jackett/11.0.9/Chart.lock b/stable/jackett/11.0.9/Chart.lock new file mode 100644 index 00000000000..34bfdaa9dd9 --- /dev/null +++ b/stable/jackett/11.0.9/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:33:23.385434874Z" diff --git a/stable/jackett/11.0.9/Chart.yaml b/stable/jackett/11.0.9/Chart.yaml new file mode 100644 index 00000000000..63d6a95712d --- /dev/null +++ b/stable/jackett/11.0.9/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "0.20.1185" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +deprecated: false +description: API Support for your favorite torrent trackers. +home: https://github.com/truecharts/apps/tree/master/charts/stable/jackett +icon: https://truecharts.org/_static/img/appicons/jackett.png +keywords: +- jackett +- torrent +- usenet +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: jackett +sources: +- https://github.com/Jackett/Jackett +type: application +version: 11.0.9 +annotations: + truecharts.org/catagories: | + - media + - test + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/jackett/11.0.9/README.md b/stable/jackett/11.0.9/README.md new file mode 100644 index 00000000000..2b9e5135427 --- /dev/null +++ b/stable/jackett/11.0.9/README.md @@ -0,0 +1,37 @@ +# Introduction + +API Support for your favorite torrent trackers. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 10.0.10 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/jackett/11.0.9/app-readme.md b/stable/jackett/11.0.9/app-readme.md new file mode 100644 index 00000000000..151894ff6be --- /dev/null +++ b/stable/jackett/11.0.9/app-readme.md @@ -0,0 +1,3 @@ +API Support for your favorite torrent trackers. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/n8n/4.0.6/charts/common-10.0.10.tgz b/stable/jackett/11.0.9/charts/common-10.0.10.tgz similarity index 100% rename from stable/n8n/4.0.6/charts/common-10.0.10.tgz rename to stable/jackett/11.0.9/charts/common-10.0.10.tgz diff --git a/stable/jackett/11.0.9/helm-values.md b/stable/jackett/11.0.9/helm-values.md new file mode 100644 index 00000000000..8bdbcf357f4 --- /dev/null +++ b/stable/jackett/11.0.9/helm-values.md @@ -0,0 +1,27 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/jackett"` | | +| image.tag | string | `"v0.20.781@sha256:96eae64bdf60250418ef7581fa5387c58b2c5963be19582ebc4151ccacc7c488"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| probes.liveness.path | string | `"/UI/Login"` | | +| probes.readiness.path | string | `"/UI/Login"` | | +| probes.startup.path | string | `"/UI/Login"` | | +| securityContext.readOnlyRootFilesystem | bool | `false` | | +| service.main.ports.main.port | int | `9117` | | +| service.main.ports.main.targetPort | int | `9117` | | +| service.main.protocol | string | `"HTTP"` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/jackett/11.0.9/ix_values.yaml b/stable/jackett/11.0.9/ix_values.yaml new file mode 100644 index 00000000000..b70ae5af8ab --- /dev/null +++ b/stable/jackett/11.0.9/ix_values.yaml @@ -0,0 +1,30 @@ +image: + repository: tccr.io/truecharts/jackett + pullPolicy: IfNotPresent + tag: v0.20.1185@sha256:1ed15e35561a6598e1194d1dc6f978950a2858b1636811f1edfe4b4823b15939 + +securityContext: + readOnlyRootFilesystem: false + +service: + main: + protocol: HTTP + ports: + main: + targetPort: 9117 + port: 9117 + +probes: + liveness: + path: "/UI/Login" + + readiness: + path: "/UI/Login" + + startup: + path: "/UI/Login" + +persistence: + config: + enabled: true + mountPath: "/config" diff --git a/stable/jackett/11.0.9/questions.yaml b/stable/jackett/11.0.9/questions.yaml new file mode 100644 index 00000000000..33aba491b3d --- /dev/null +++ b/stable/jackett/11.0.9/questions.yaml @@ -0,0 +1,2439 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 9117 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 9117 + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: false + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + +# - variable: autoscaling +# group: "Advanced" +# label: "(Advanced) Horizontal Pod Autoscaler" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: target +# label: "Target" +# description: "deployment name, defaults to main deployment" +# schema: +# type: string +# default: "" +# - variable: minReplicas +# label: "Minimum Replicas" +# schema: +# type: int +# default: 1 +# - variable: maxReplicas +# label: "Maximum Replicas" +# schema: +# type: int +# default: 5 +# - variable: targetCPUUtilizationPercentage +# label: "Target CPU Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: targetMemoryUtilizationPercentage +# label: "Target Memory Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: networkPolicy +# group: "Advanced" +# label: "(Advanced) Network Policy" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: policyType +# label: "Policy Type" +# schema: +# type: string +# default: "" +# enum: +# - value: "" +# description: "Default" +# - value: "ingress" +# description: "Ingress" +# - value: "egress" +# description: "Egress" +# - value: "ingress-egress" +# description: "Ingress and Egress" +# - variable: egress +# label: "Egress" +# schema: +# type: list +# default: [] +# items: +# - variable: egressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: to +# label: "To" +# schema: +# type: list +# default: [] +# items: +# - variable: toEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" +# - variable: ingress +# label: "Ingress" +# schema: +# type: list +# default: [] +# items: +# - variable: ingressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: from +# label: "From" +# schema: +# type: list +# default: [] +# items: +# - variable: fromEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/jackett/11.0.9/security.md b/stable/jackett/11.0.9/security.md new file mode 100644 index 00000000000..f6f7306f1b3 --- /dev/null +++ b/stable/jackett/11.0.9/security.md @@ -0,0 +1,233 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: jackett/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-jackett' of Deployment 'RELEASE-NAME-jackett' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jackett' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-jackett' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-jackett' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-jackett' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-jackett' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-jackett' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/jackett:v0.20.1185@sha256:1ed15e35561a6598e1194d1dc6f978950a2858b1636811f1edfe4b4823b15939 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/jackett:v0.20.1185@sha256:1ed15e35561a6598e1194d1dc6f978950a2858b1636811f1edfe4b4823b15939 (ubuntu 20.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| curl | CVE-2022-27782 | MEDIUM | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7ubuntu3 | 1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
https://ubuntu.com/security/notices/USN-5446-1
https://ubuntu.com/security/notices/USN-5446-2
| +| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
| +| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpython3.8-minimal | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libpython3.8-stdlib | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsepol1 | CVE-2021-36084 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.31.1-4ubuntu0.2 | 3.31.1-4ubuntu0.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.10+dfsg-5ubuntu0.20.04.2 | 2.9.10+dfsg-5ubuntu0.20.04.3 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| +| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| openssl | CVE-2022-1292 | MEDIUM | 1.1.1f-1ubuntu2.12 | 1.1.1f-1ubuntu2.13 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| python3.8 | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| python3.8-minimal | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2022-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0261
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318
https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0318
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319
https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0361
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0368
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0392
| +| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417
https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0417
| +| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554
https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0554
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0572
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629
https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
https://nvd.nist.gov/vuln/detail/CVE-2022-0629
| +| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)
https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/
https://nvd.nist.gov/vuln/detail/CVE-2022-1420
| +| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)
https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1616
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1620
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)
https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/
| +| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3973
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0443
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0729
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2022-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0261
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318
https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0318
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319
https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0361
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0368
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0392
| +| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417
https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0417
| +| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554
https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0554
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0572
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629
https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
https://nvd.nist.gov/vuln/detail/CVE-2022-0629
| +| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)
https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/
https://nvd.nist.gov/vuln/detail/CVE-2022-1420
| +| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)
https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1616
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1620
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)
https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/
| +| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3973
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0443
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0729
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2022-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0261
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318
https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0318
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319
https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0361
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0368
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0392
| +| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417
https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0417
| +| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554
https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0554
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0572
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629
https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
https://nvd.nist.gov/vuln/detail/CVE-2022-0629
| +| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)
https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/
https://nvd.nist.gov/vuln/detail/CVE-2022-1420
| +| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)
https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1616
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1620
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)
https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/
| +| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3973
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0443
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0729
https://ubuntu.com/security/notices/USN-5460-1
| diff --git a/stable/omada-controller/6.0.8/templates/common.yaml b/stable/jackett/11.0.9/templates/common.yaml similarity index 100% rename from stable/omada-controller/6.0.8/templates/common.yaml rename to stable/jackett/11.0.9/templates/common.yaml diff --git a/stable/n8n/4.0.6/values.yaml b/stable/jackett/11.0.9/values.yaml similarity index 100% rename from stable/n8n/4.0.6/values.yaml rename to stable/jackett/11.0.9/values.yaml diff --git a/stable/littlelink/6.0.6/Chart.lock b/stable/littlelink/6.0.6/Chart.lock deleted file mode 100644 index d04447c64ce..00000000000 --- a/stable/littlelink/6.0.6/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:29:05.716251591Z" diff --git a/stable/littlelink/6.0.6/CHANGELOG.md b/stable/littlelink/6.0.7/CHANGELOG.md similarity index 90% rename from stable/littlelink/6.0.6/CHANGELOG.md rename to stable/littlelink/6.0.7/CHANGELOG.md index a03f9a5a6b3..8e6513b66de 100644 --- a/stable/littlelink/6.0.6/CHANGELOG.md +++ b/stable/littlelink/6.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [littlelink-6.0.7](https://github.com/truecharts/apps/compare/littlelink-6.0.6...littlelink-6.0.7) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [littlelink-6.0.6](https://github.com/truecharts/apps/compare/littlelink-6.0.5...littlelink-6.0.6) (2022-06-14) @@ -88,12 +97,3 @@ #### Chore * update docker general non-major ([#2821](https://github.com/truecharts/apps/issues/2821)) - - - - -### [littlelink-5.0.28](https://github.com/truecharts/apps/compare/littlelink-5.0.27...littlelink-5.0.28) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) diff --git a/stable/prometheus/4.0.7/CONFIG.md b/stable/littlelink/6.0.7/CONFIG.md similarity index 100% rename from stable/prometheus/4.0.7/CONFIG.md rename to stable/littlelink/6.0.7/CONFIG.md diff --git a/stable/littlelink/6.0.7/Chart.lock b/stable/littlelink/6.0.7/Chart.lock new file mode 100644 index 00000000000..b4460851e06 --- /dev/null +++ b/stable/littlelink/6.0.7/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:33:32.007726992Z" diff --git a/stable/littlelink/6.0.6/Chart.yaml b/stable/littlelink/6.0.7/Chart.yaml similarity index 98% rename from stable/littlelink/6.0.6/Chart.yaml rename to stable/littlelink/6.0.7/Chart.yaml index dad669785d4..bc53525647d 100644 --- a/stable/littlelink/6.0.6/Chart.yaml +++ b/stable/littlelink/6.0.7/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/techno-tim/littlelink-server - https://github.com/sethcottle/littlelink type: application -version: 6.0.6 +version: 6.0.7 annotations: truecharts.org/catagories: | - social diff --git a/stable/littlelink/6.0.6/README.md b/stable/littlelink/6.0.7/README.md similarity index 100% rename from stable/littlelink/6.0.6/README.md rename to stable/littlelink/6.0.7/README.md diff --git a/stable/littlelink/6.0.6/app-readme.md b/stable/littlelink/6.0.7/app-readme.md similarity index 100% rename from stable/littlelink/6.0.6/app-readme.md rename to stable/littlelink/6.0.7/app-readme.md diff --git a/stable/nocodb/3.0.4/charts/common-10.0.10.tgz b/stable/littlelink/6.0.7/charts/common-10.0.10.tgz similarity index 100% rename from stable/nocodb/3.0.4/charts/common-10.0.10.tgz rename to stable/littlelink/6.0.7/charts/common-10.0.10.tgz diff --git a/stable/littlelink/6.0.6/helm-values.md b/stable/littlelink/6.0.7/helm-values.md similarity index 100% rename from stable/littlelink/6.0.6/helm-values.md rename to stable/littlelink/6.0.7/helm-values.md diff --git a/stable/littlelink/6.0.6/ix_values.yaml b/stable/littlelink/6.0.7/ix_values.yaml similarity index 93% rename from stable/littlelink/6.0.6/ix_values.yaml rename to stable/littlelink/6.0.7/ix_values.yaml index 3513a5d8af8..d416fa3932a 100644 --- a/stable/littlelink/6.0.6/ix_values.yaml +++ b/stable/littlelink/6.0.7/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/littlelink-server pullPolicy: IfNotPresent - tag: latest@sha256:2ae3773c7cb2c9fd353563d6bd1fbe8098e5cb688107d2123e3c3c9700b8f003 + tag: latest@sha256:b0cc06543a97b0409cc54b7eb8f7201731b088b574b1d1ca4257a617ed2ec8d1 service: main: diff --git a/stable/littlelink/6.0.6/questions.yaml b/stable/littlelink/6.0.7/questions.yaml similarity index 100% rename from stable/littlelink/6.0.6/questions.yaml rename to stable/littlelink/6.0.7/questions.yaml diff --git a/stable/littlelink/6.0.6/security.md b/stable/littlelink/6.0.7/security.md similarity index 95% rename from stable/littlelink/6.0.6/security.md rename to stable/littlelink/6.0.7/security.md index 979b9c2b00b..6cd7b07efb7 100644 --- a/stable/littlelink/6.0.6/security.md +++ b/stable/littlelink/6.0.7/security.md @@ -34,7 +34,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/littlelink-server:latest@sha256:2ae3773c7cb2c9fd353563d6bd1fbe8098e5cb688107d2123e3c3c9700b8f003 + tccr.io/truecharts/littlelink-server:latest@sha256:b0cc06543a97b0409cc54b7eb8f7201731b088b574b1d1ca4257a617ed2ec8d1 ##### Scan Results @@ -49,18 +49,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:2ae3773c7cb2c9fd353563d6bd1fbe8098e5cb688107d2123e3c3c9700b8f003 (alpine 3.15.4) +#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:b0cc06543a97b0409cc54b7eb8f7201731b088b574b1d1ca4257a617ed2ec8d1 (alpine 3.15.4) **alpine** @@ -76,4 +76,4 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| npm | CVE-2022-29244 | MEDIUM | 8.5.5 | 8.11.0 |
Expand...https://github.com/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/nodejs/node/pull/43210
https://github.com/nodejs/node/releases/tag/v16.15.1
https://github.com/nodejs/node/releases/tag/v17.9.1
https://github.com/nodejs/node/releases/tag/v18.3.0
https://github.com/npm/cli/releases/tag/v8.11.0
https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/npm/cli/tree/latest/workspaces/libnpmpack
https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish
https://github.com/npm/npm-packlist
| +| npm | CVE-2022-29244 | MEDIUM | 8.5.5 | 8.11.0 |
Expand...https://github.com/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/nodejs/node/pull/43210
https://github.com/nodejs/node/releases/tag/v16.15.1
https://github.com/nodejs/node/releases/tag/v17.9.1
https://github.com/nodejs/node/releases/tag/v18.3.0
https://github.com/npm/cli/releases/tag/v8.11.0
https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/npm/cli/tree/latest/workspaces/libnpmpack
https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish
https://github.com/npm/npm-packlist
https://nvd.nist.gov/vuln/detail/CVE-2022-29244
| diff --git a/stable/littlelink/6.0.6/templates/_configmap.tpl b/stable/littlelink/6.0.7/templates/_configmap.tpl similarity index 100% rename from stable/littlelink/6.0.6/templates/_configmap.tpl rename to stable/littlelink/6.0.7/templates/_configmap.tpl diff --git a/stable/littlelink/6.0.6/templates/common.yaml b/stable/littlelink/6.0.7/templates/common.yaml similarity index 100% rename from stable/littlelink/6.0.6/templates/common.yaml rename to stable/littlelink/6.0.7/templates/common.yaml diff --git a/stable/nocodb/3.0.4/values.yaml b/stable/littlelink/6.0.7/values.yaml similarity index 100% rename from stable/nocodb/3.0.4/values.yaml rename to stable/littlelink/6.0.7/values.yaml diff --git a/stable/mattermost/3.0.4/CHANGELOG.md b/stable/mattermost/3.0.5/CHANGELOG.md similarity index 91% rename from stable/mattermost/3.0.4/CHANGELOG.md rename to stable/mattermost/3.0.5/CHANGELOG.md index b8e40555f62..a5450a78be1 100644 --- a/stable/mattermost/3.0.4/CHANGELOG.md +++ b/stable/mattermost/3.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [mattermost-3.0.5](https://github.com/truecharts/apps/compare/mattermost-3.0.4...mattermost-3.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [mattermost-3.0.4](https://github.com/truecharts/apps/compare/mattermost-3.0.3...mattermost-3.0.4) (2022-06-14) @@ -88,12 +97,3 @@ #### Chore * update docker general non-major ([#2826](https://github.com/truecharts/apps/issues/2826)) - - - - -### [mattermost-1.0.1](https://github.com/truecharts/apps/compare/mattermost-1.0.0...mattermost-1.0.1) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) diff --git a/stable/babybuddy/8.0.4/Chart.lock b/stable/mattermost/3.0.5/Chart.lock similarity index 85% rename from stable/babybuddy/8.0.4/Chart.lock rename to stable/mattermost/3.0.5/Chart.lock index 00ab320112b..9c393207954 100644 --- a/stable/babybuddy/8.0.4/Chart.lock +++ b/stable/mattermost/3.0.5/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org/ version: 8.0.7 digest: sha256:2b4c13c14e572773165d89a3f24c637b85e6f0350c73bb5ee029464a014327d6 -generated: "2022-06-14T18:51:33.170640811Z" +generated: "2022-06-15T07:33:38.792210257Z" diff --git a/stable/mattermost/3.0.4/Chart.yaml b/stable/mattermost/3.0.5/Chart.yaml similarity index 98% rename from stable/mattermost/3.0.4/Chart.yaml rename to stable/mattermost/3.0.5/Chart.yaml index cc66b53c95a..42bb7306e1c 100644 --- a/stable/mattermost/3.0.4/Chart.yaml +++ b/stable/mattermost/3.0.5/Chart.yaml @@ -24,7 +24,7 @@ name: mattermost sources: - https://github.com/mattermost/mattermost-server - https://github.com/mattermost/docker -version: 3.0.4 +version: 3.0.5 annotations: truecharts.org/catagories: | - hosting diff --git a/stable/mattermost/3.0.4/README.md b/stable/mattermost/3.0.5/README.md similarity index 100% rename from stable/mattermost/3.0.4/README.md rename to stable/mattermost/3.0.5/README.md diff --git a/stable/mattermost/3.0.4/app-readme.md b/stable/mattermost/3.0.5/app-readme.md similarity index 100% rename from stable/mattermost/3.0.4/app-readme.md rename to stable/mattermost/3.0.5/app-readme.md diff --git a/stable/omada-controller/6.0.8/charts/common-10.0.10.tgz b/stable/mattermost/3.0.5/charts/common-10.0.10.tgz similarity index 100% rename from stable/omada-controller/6.0.8/charts/common-10.0.10.tgz rename to stable/mattermost/3.0.5/charts/common-10.0.10.tgz diff --git a/stable/n8n/4.0.6/charts/postgresql-8.0.7.tgz b/stable/mattermost/3.0.5/charts/postgresql-8.0.7.tgz similarity index 100% rename from stable/n8n/4.0.6/charts/postgresql-8.0.7.tgz rename to stable/mattermost/3.0.5/charts/postgresql-8.0.7.tgz diff --git a/stable/mattermost/3.0.4/ix_values.yaml b/stable/mattermost/3.0.5/ix_values.yaml similarity index 92% rename from stable/mattermost/3.0.4/ix_values.yaml rename to stable/mattermost/3.0.5/ix_values.yaml index b04d80005c5..4af2356a722 100644 --- a/stable/mattermost/3.0.4/ix_values.yaml +++ b/stable/mattermost/3.0.5/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/mattermost - tag: v6.3@sha256:63bcac5c8934f621b611f264de9825daed3852d6a89fab06c24b2ebd2b11e927 + tag: v6.3@sha256:ef1cd13c2d6c1771928871c51f823027da5c2972e47be3eecfa0995b4d538277 pullPolicy: IfNotPresent env: diff --git a/stable/mattermost/3.0.4/questions.yaml b/stable/mattermost/3.0.5/questions.yaml similarity index 100% rename from stable/mattermost/3.0.4/questions.yaml rename to stable/mattermost/3.0.5/questions.yaml diff --git a/stable/mattermost/3.0.4/security.md b/stable/mattermost/3.0.5/security.md similarity index 99% rename from stable/mattermost/3.0.4/security.md rename to stable/mattermost/3.0.5/security.md index 2ae240ed718..ec0e6cd2013 100644 --- a/stable/mattermost/3.0.4/security.md +++ b/stable/mattermost/3.0.5/security.md @@ -58,7 +58,7 @@ hide: tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 - tccr.io/truecharts/mattermost:v6.3@sha256:63bcac5c8934f621b611f264de9825daed3852d6a89fab06c24b2ebd2b11e927 + tccr.io/truecharts/mattermost:v6.3@sha256:ef1cd13c2d6c1771928871c51f823027da5c2972e47be3eecfa0995b4d538277 ##### Scan Results @@ -167,10 +167,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -189,8 +189,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -207,8 +207,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -340,10 +340,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -362,8 +362,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -380,8 +380,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -409,7 +409,7 @@ hide: | github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| -#### Container: tccr.io/truecharts/mattermost:v6.3@sha256:63bcac5c8934f621b611f264de9825daed3852d6a89fab06c24b2ebd2b11e927 (alpine 3.14.6) +#### Container: tccr.io/truecharts/mattermost:v6.3@sha256:ef1cd13c2d6c1771928871c51f823027da5c2972e47be3eecfa0995b4d538277 (alpine 3.14.6) **alpine** diff --git a/stable/rsshub/3.0.8/templates/common.yaml b/stable/mattermost/3.0.5/templates/common.yaml similarity index 100% rename from stable/rsshub/3.0.8/templates/common.yaml rename to stable/mattermost/3.0.5/templates/common.yaml diff --git a/stable/omada-controller/6.0.8/values.yaml b/stable/mattermost/3.0.5/values.yaml similarity index 100% rename from stable/omada-controller/6.0.8/values.yaml rename to stable/mattermost/3.0.5/values.yaml diff --git a/stable/n8n/4.0.6/CHANGELOG.md b/stable/n8n/4.0.7/CHANGELOG.md similarity index 90% rename from stable/n8n/4.0.6/CHANGELOG.md rename to stable/n8n/4.0.7/CHANGELOG.md index d491b1cf4d4..704c34ab865 100644 --- a/stable/n8n/4.0.6/CHANGELOG.md +++ b/stable/n8n/4.0.7/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [n8n-4.0.7](https://github.com/truecharts/apps/compare/n8n-4.0.6...n8n-4.0.7) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [n8n-4.0.6](https://github.com/truecharts/apps/compare/n8n-4.0.5...n8n-4.0.6) (2022-06-14) @@ -88,12 +97,3 @@ -### [n8n-3.0.0](https://github.com/truecharts/apps/compare/n8n-2.0.37...n8n-3.0.0) (2022-06-07) - -#### Chore - -* sync all apps persistence configuration and always default to PVC - -#### Refactor - -* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) diff --git a/stable/rsshub/3.0.8/CONFIG.md b/stable/n8n/4.0.7/CONFIG.md similarity index 100% rename from stable/rsshub/3.0.8/CONFIG.md rename to stable/n8n/4.0.7/CONFIG.md diff --git a/stable/n8n/4.0.6/Chart.lock b/stable/n8n/4.0.7/Chart.lock similarity index 88% rename from stable/n8n/4.0.6/Chart.lock rename to stable/n8n/4.0.7/Chart.lock index 6d68d0e377a..0074490a916 100644 --- a/stable/n8n/4.0.6/Chart.lock +++ b/stable/n8n/4.0.7/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.truecharts.org version: 3.0.7 digest: sha256:ad62d55cd3d67c0e79335f748fb09122b26eda636a79c0d721527650348e4162 -generated: "2022-06-14T19:00:49.122577985Z" +generated: "2022-06-15T07:33:52.300088248Z" diff --git a/stable/n8n/4.0.6/Chart.yaml b/stable/n8n/4.0.7/Chart.yaml similarity index 96% rename from stable/n8n/4.0.6/Chart.yaml rename to stable/n8n/4.0.7/Chart.yaml index 4406060bcc1..8f57245efd6 100644 --- a/stable/n8n/4.0.6/Chart.yaml +++ b/stable/n8n/4.0.7/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.181.2" +appVersion: "0.182.0" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -28,7 +28,7 @@ sources: - https://docs.n8n.io/ - https://github.com/n8n-io/n8n - https://hub.docker.com/r/n8nio/n8n -version: 4.0.6 +version: 4.0.7 annotations: truecharts.org/catagories: | - media diff --git a/stable/n8n/4.0.6/README.md b/stable/n8n/4.0.7/README.md similarity index 100% rename from stable/n8n/4.0.6/README.md rename to stable/n8n/4.0.7/README.md diff --git a/stable/n8n/4.0.6/app-readme.md b/stable/n8n/4.0.7/app-readme.md similarity index 100% rename from stable/n8n/4.0.6/app-readme.md rename to stable/n8n/4.0.7/app-readme.md diff --git a/stable/prometheus/4.0.7/charts/common-10.0.10.tgz b/stable/n8n/4.0.7/charts/common-10.0.10.tgz similarity index 100% rename from stable/prometheus/4.0.7/charts/common-10.0.10.tgz rename to stable/n8n/4.0.7/charts/common-10.0.10.tgz diff --git a/stable/nocodb/3.0.4/charts/postgresql-8.0.7.tgz b/stable/n8n/4.0.7/charts/postgresql-8.0.7.tgz similarity index 100% rename from stable/nocodb/3.0.4/charts/postgresql-8.0.7.tgz rename to stable/n8n/4.0.7/charts/postgresql-8.0.7.tgz diff --git a/stable/n8n/4.0.6/charts/redis-3.0.7.tgz b/stable/n8n/4.0.7/charts/redis-3.0.7.tgz similarity index 100% rename from stable/n8n/4.0.6/charts/redis-3.0.7.tgz rename to stable/n8n/4.0.7/charts/redis-3.0.7.tgz diff --git a/stable/n8n/4.0.6/helm-values.md b/stable/n8n/4.0.7/helm-values.md similarity index 100% rename from stable/n8n/4.0.6/helm-values.md rename to stable/n8n/4.0.7/helm-values.md diff --git a/stable/n8n/4.0.6/ix_values.yaml b/stable/n8n/4.0.7/ix_values.yaml similarity index 97% rename from stable/n8n/4.0.6/ix_values.yaml rename to stable/n8n/4.0.7/ix_values.yaml index 2f1b348db00..aa03aab6685 100644 --- a/stable/n8n/4.0.6/ix_values.yaml +++ b/stable/n8n/4.0.7/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/n8n - tag: v0.181.2@sha256:c9f24dfc9829035284fe37c26842a0650e67b07a4f735f2c8bdbdb5eb0606ec9 + tag: v0.182.0@sha256:019ad778d4314a508fbd0991776add556a9f6a6492fffcd3bfedf7feed03ed1a pullPolicy: IfNotPresent securityContext: diff --git a/stable/n8n/4.0.6/questions.yaml b/stable/n8n/4.0.7/questions.yaml similarity index 100% rename from stable/n8n/4.0.6/questions.yaml rename to stable/n8n/4.0.7/questions.yaml diff --git a/stable/n8n/4.0.6/security.md b/stable/n8n/4.0.7/security.md similarity index 100% rename from stable/n8n/4.0.6/security.md rename to stable/n8n/4.0.7/security.md diff --git a/stable/n8n/4.0.6/templates/_configmap.tpl b/stable/n8n/4.0.7/templates/_configmap.tpl similarity index 100% rename from stable/n8n/4.0.6/templates/_configmap.tpl rename to stable/n8n/4.0.7/templates/_configmap.tpl diff --git a/stable/n8n/4.0.6/templates/common.yaml b/stable/n8n/4.0.7/templates/common.yaml similarity index 100% rename from stable/n8n/4.0.6/templates/common.yaml rename to stable/n8n/4.0.7/templates/common.yaml diff --git a/stable/prometheus/4.0.7/values.yaml b/stable/n8n/4.0.7/values.yaml similarity index 100% rename from stable/prometheus/4.0.7/values.yaml rename to stable/n8n/4.0.7/values.yaml diff --git a/stable/nocodb/3.0.4/CHANGELOG.md b/stable/nocodb/3.0.5/CHANGELOG.md similarity index 91% rename from stable/nocodb/3.0.4/CHANGELOG.md rename to stable/nocodb/3.0.5/CHANGELOG.md index 74e8864a9b0..fc7085f1d50 100644 --- a/stable/nocodb/3.0.4/CHANGELOG.md +++ b/stable/nocodb/3.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [nocodb-3.0.5](https://github.com/truecharts/apps/compare/nocodb-3.0.4...nocodb-3.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [nocodb-3.0.4](https://github.com/truecharts/apps/compare/nocodb-3.0.3...nocodb-3.0.4) (2022-06-14) @@ -88,12 +97,3 @@ #### Chore * update docker general non-major ([#2806](https://github.com/truecharts/apps/issues/2806)) - - - - -### [nocodb-1.0.15](https://github.com/truecharts/apps/compare/nocodb-1.0.14...nocodb-1.0.15) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) diff --git a/stable/nocodb/3.0.4/Chart.lock b/stable/nocodb/3.0.5/Chart.lock similarity index 88% rename from stable/nocodb/3.0.4/Chart.lock rename to stable/nocodb/3.0.5/Chart.lock index c03a8ce7cb4..7c889304442 100644 --- a/stable/nocodb/3.0.4/Chart.lock +++ b/stable/nocodb/3.0.5/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.truecharts.org version: 3.0.7 digest: sha256:ad62d55cd3d67c0e79335f748fb09122b26eda636a79c0d721527650348e4162 -generated: "2022-06-14T19:01:07.132043476Z" +generated: "2022-06-15T07:34:16.509407775Z" diff --git a/stable/nocodb/3.0.4/Chart.yaml b/stable/nocodb/3.0.5/Chart.yaml similarity index 96% rename from stable/nocodb/3.0.4/Chart.yaml rename to stable/nocodb/3.0.5/Chart.yaml index 53c98133624..d60aaff63cf 100644 --- a/stable/nocodb/3.0.4/Chart.yaml +++ b/stable/nocodb/3.0.5/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.91.7" +appVersion: "0.91.9" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -26,7 +26,7 @@ name: nocodb sources: - https://hub.docker.com/r/nocodb/nocodb - https://github.com/nocodb/nocodb -version: 3.0.4 +version: 3.0.5 annotations: truecharts.org/catagories: | - productivity diff --git a/stable/nocodb/3.0.4/README.md b/stable/nocodb/3.0.5/README.md similarity index 100% rename from stable/nocodb/3.0.4/README.md rename to stable/nocodb/3.0.5/README.md diff --git a/stable/nocodb/3.0.4/app-readme.md b/stable/nocodb/3.0.5/app-readme.md similarity index 100% rename from stable/nocodb/3.0.4/app-readme.md rename to stable/nocodb/3.0.5/app-readme.md diff --git a/stable/rsshub/3.0.8/charts/common-10.0.10.tgz b/stable/nocodb/3.0.5/charts/common-10.0.10.tgz similarity index 100% rename from stable/rsshub/3.0.8/charts/common-10.0.10.tgz rename to stable/nocodb/3.0.5/charts/common-10.0.10.tgz diff --git a/stable/synapse/4.0.3/charts/postgresql-8.0.7.tgz b/stable/nocodb/3.0.5/charts/postgresql-8.0.7.tgz similarity index 100% rename from stable/synapse/4.0.3/charts/postgresql-8.0.7.tgz rename to stable/nocodb/3.0.5/charts/postgresql-8.0.7.tgz diff --git a/stable/nocodb/3.0.4/charts/redis-3.0.7.tgz b/stable/nocodb/3.0.5/charts/redis-3.0.7.tgz similarity index 100% rename from stable/nocodb/3.0.4/charts/redis-3.0.7.tgz rename to stable/nocodb/3.0.5/charts/redis-3.0.7.tgz diff --git a/stable/nocodb/3.0.4/ix_values.yaml b/stable/nocodb/3.0.5/ix_values.yaml similarity index 92% rename from stable/nocodb/3.0.4/ix_values.yaml rename to stable/nocodb/3.0.5/ix_values.yaml index 38eadff232b..e0e1bf3fd76 100644 --- a/stable/nocodb/3.0.4/ix_values.yaml +++ b/stable/nocodb/3.0.5/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/nocodb - tag: v0.91.7@sha256:d4976f811c958e070ee653920b46753c2b4ecbb9468adf7eed17cda4b3526aed + tag: v0.91.9@sha256:50fb81a35487ea4f9b16f05fbd592a1fa8c4b92f07f2c46668619f13119bdbc2 pullPolicy: IfNotPresent securityContext: diff --git a/stable/nocodb/3.0.4/questions.yaml b/stable/nocodb/3.0.5/questions.yaml similarity index 100% rename from stable/nocodb/3.0.4/questions.yaml rename to stable/nocodb/3.0.5/questions.yaml diff --git a/stable/nocodb/3.0.4/security.md b/stable/nocodb/3.0.5/security.md similarity index 99% rename from stable/nocodb/3.0.4/security.md rename to stable/nocodb/3.0.5/security.md index a3d8361a4dc..fb08e36d90e 100644 --- a/stable/nocodb/3.0.4/security.md +++ b/stable/nocodb/3.0.5/security.md @@ -78,7 +78,7 @@ hide: tccr.io/truecharts/redis:v7.0.2@sha256:1260b1716a9b5062f0f4bbd0bf213adcc64c822f429c9c094f22291ae903ded8 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/postgresql:v14.3.0@sha256:5a7765edadb738a56757590d843417861d27628cf56fefb25e30870f5e047620 - tccr.io/truecharts/nocodb:v0.91.7@sha256:d4976f811c958e070ee653920b46753c2b4ecbb9468adf7eed17cda4b3526aed + tccr.io/truecharts/nocodb:v0.91.9@sha256:50fb81a35487ea4f9b16f05fbd592a1fa8c4b92f07f2c46668619f13119bdbc2 ##### Scan Results @@ -187,10 +187,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -209,8 +209,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -227,8 +227,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -352,10 +352,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -372,8 +372,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -381,8 +381,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -506,10 +506,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -528,8 +528,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -546,8 +546,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -575,7 +575,7 @@ hide: | github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| -#### Container: tccr.io/truecharts/nocodb:v0.91.7@sha256:d4976f811c958e070ee653920b46753c2b4ecbb9468adf7eed17cda4b3526aed (alpine 3.12.12) +#### Container: tccr.io/truecharts/nocodb:v0.91.9@sha256:50fb81a35487ea4f9b16f05fbd592a1fa8c4b92f07f2c46668619f13119bdbc2 (alpine 3.12.12) **alpine** diff --git a/stable/nocodb/3.0.4/templates/_configmap.tpl b/stable/nocodb/3.0.5/templates/_configmap.tpl similarity index 100% rename from stable/nocodb/3.0.4/templates/_configmap.tpl rename to stable/nocodb/3.0.5/templates/_configmap.tpl diff --git a/stable/nocodb/3.0.4/templates/_secrets.tpl b/stable/nocodb/3.0.5/templates/_secrets.tpl similarity index 100% rename from stable/nocodb/3.0.4/templates/_secrets.tpl rename to stable/nocodb/3.0.5/templates/_secrets.tpl diff --git a/stable/nocodb/3.0.4/templates/common.yaml b/stable/nocodb/3.0.5/templates/common.yaml similarity index 100% rename from stable/nocodb/3.0.4/templates/common.yaml rename to stable/nocodb/3.0.5/templates/common.yaml diff --git a/stable/rsshub/3.0.8/values.yaml b/stable/nocodb/3.0.5/values.yaml similarity index 100% rename from stable/rsshub/3.0.8/values.yaml rename to stable/nocodb/3.0.5/values.yaml diff --git a/stable/omada-controller/6.0.8/Chart.lock b/stable/omada-controller/6.0.8/Chart.lock deleted file mode 100644 index 627b2edb648..00000000000 --- a/stable/omada-controller/6.0.8/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:37:59.621339858Z" diff --git a/stable/omada-controller/6.0.8/CHANGELOG.md b/stable/omada-controller/6.0.9/CHANGELOG.md similarity index 91% rename from stable/omada-controller/6.0.8/CHANGELOG.md rename to stable/omada-controller/6.0.9/CHANGELOG.md index b985972f0f8..02d87c08b39 100644 --- a/stable/omada-controller/6.0.8/CHANGELOG.md +++ b/stable/omada-controller/6.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [omada-controller-6.0.9](https://github.com/truecharts/apps/compare/omada-controller-6.0.8...omada-controller-6.0.9) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [omada-controller-6.0.8](https://github.com/truecharts/apps/compare/omada-controller-6.0.7...omada-controller-6.0.8) (2022-06-14) @@ -88,12 +97,3 @@ ### [omada-controller-6.0.1](https://github.com/truecharts/apps/compare/omada-controller-5.0.35...omada-controller-6.0.1) (2022-06-07) -#### Chore - -* Auto-update chart README [skip ci] -* sync all apps persistence configuration and always default to PVC - -#### Fix - -* remove malfunctioning SCALE migration script - diff --git a/stable/snipe-it/4.0.4/CONFIG.md b/stable/omada-controller/6.0.9/CONFIG.md similarity index 100% rename from stable/snipe-it/4.0.4/CONFIG.md rename to stable/omada-controller/6.0.9/CONFIG.md diff --git a/stable/omada-controller/6.0.9/Chart.lock b/stable/omada-controller/6.0.9/Chart.lock new file mode 100644 index 00000000000..d98cde85931 --- /dev/null +++ b/stable/omada-controller/6.0.9/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:34:17.438202616Z" diff --git a/stable/omada-controller/6.0.8/Chart.yaml b/stable/omada-controller/6.0.9/Chart.yaml similarity index 98% rename from stable/omada-controller/6.0.8/Chart.yaml rename to stable/omada-controller/6.0.9/Chart.yaml index afa37e8af19..5cde59566d6 100644 --- a/stable/omada-controller/6.0.8/Chart.yaml +++ b/stable/omada-controller/6.0.9/Chart.yaml @@ -18,7 +18,7 @@ name: omada-controller sources: - https://github.com/mbentley/docker-omada-controller - https://github.com/truecharts/apps/tree/master/charts/omada-controller -version: 6.0.8 +version: 6.0.9 annotations: truecharts.org/catagories: | - media diff --git a/stable/omada-controller/6.0.8/README.md b/stable/omada-controller/6.0.9/README.md similarity index 100% rename from stable/omada-controller/6.0.8/README.md rename to stable/omada-controller/6.0.9/README.md diff --git a/stable/omada-controller/6.0.8/app-readme.md b/stable/omada-controller/6.0.9/app-readme.md similarity index 100% rename from stable/omada-controller/6.0.8/app-readme.md rename to stable/omada-controller/6.0.9/app-readme.md diff --git a/stable/snipe-it/4.0.4/charts/common-10.0.10.tgz b/stable/omada-controller/6.0.9/charts/common-10.0.10.tgz similarity index 100% rename from stable/snipe-it/4.0.4/charts/common-10.0.10.tgz rename to stable/omada-controller/6.0.9/charts/common-10.0.10.tgz diff --git a/stable/omada-controller/6.0.8/helm-values.md b/stable/omada-controller/6.0.9/helm-values.md similarity index 100% rename from stable/omada-controller/6.0.8/helm-values.md rename to stable/omada-controller/6.0.9/helm-values.md diff --git a/stable/omada-controller/6.0.8/ix_values.yaml b/stable/omada-controller/6.0.9/ix_values.yaml similarity index 93% rename from stable/omada-controller/6.0.8/ix_values.yaml rename to stable/omada-controller/6.0.9/ix_values.yaml index 4598b44e31c..ad493e2c32f 100644 --- a/stable/omada-controller/6.0.8/ix_values.yaml +++ b/stable/omada-controller/6.0.9/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/omada-controller - tag: v5.3@sha256:fb5d7a6f70fc0a9dcc9cfd51ba33adc9159daf2af041450cc8e27efb542cca23 + tag: v5.3@sha256:02a707049a67a2df6a90a76eef3e9cd4309b40c8f05bcf506834906e1ea88d83 pullPolicy: IfNotPresent securityContext: diff --git a/stable/omada-controller/6.0.8/questions.yaml b/stable/omada-controller/6.0.9/questions.yaml similarity index 100% rename from stable/omada-controller/6.0.8/questions.yaml rename to stable/omada-controller/6.0.9/questions.yaml diff --git a/stable/omada-controller/6.0.8/security.md b/stable/omada-controller/6.0.9/security.md similarity index 98% rename from stable/omada-controller/6.0.8/security.md rename to stable/omada-controller/6.0.9/security.md index be31459162c..7f4ca773e35 100644 --- a/stable/omada-controller/6.0.8/security.md +++ b/stable/omada-controller/6.0.9/security.md @@ -36,7 +36,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/omada-controller:v5.3@sha256:fb5d7a6f70fc0a9dcc9cfd51ba33adc9159daf2af041450cc8e27efb542cca23 + tccr.io/truecharts/omada-controller:v5.3@sha256:02a707049a67a2df6a90a76eef3e9cd4309b40c8f05bcf506834906e1ea88d83 ##### Scan Results @@ -51,18 +51,18 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/omada-controller:v5.3@sha256:fb5d7a6f70fc0a9dcc9cfd51ba33adc9159daf2af041450cc8e27efb542cca23 (ubuntu 20.04) +#### Container: tccr.io/truecharts/omada-controller:v5.3@sha256:02a707049a67a2df6a90a76eef3e9cd4309b40c8f05bcf506834906e1ea88d83 (ubuntu 20.04) **ubuntu** @@ -86,10 +86,10 @@ hide: | libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| | libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libnss3 | CVE-2022-22747 | LOW | 2:3.49.1-1ubuntu1.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
https://linux.oracle.com/cve/CVE-2022-22747.html
https://linux.oracle.com/errata/ELSA-2022-0130.html
https://ubuntu.com/security/notices/USN-5229-1
https://ubuntu.com/security/notices/USN-5246-1
https://ubuntu.com/security/notices/USN-5248-1
https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/#CVE-2022-22747
| | libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| @@ -98,8 +98,8 @@ hide: | libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| | libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| | libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libyaml-cpp0.6 | CVE-2017-11692 | LOW | 0.6.2-4ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-11692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11692
https://github.com/jbeder/yaml-cpp/issues/519
https://security.gentoo.org/glsa/202007-14
| | libyaml-cpp0.6 | CVE-2017-5950 | LOW | 0.6.2-4ubuntu1 | |
Expand...http://www.securityfocus.com/bid/97307
https://access.redhat.com/security/cve/CVE-2017-5950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5950
https://github.com/jbeder/yaml-cpp/issues/459
| | libyaml-cpp0.6 | CVE-2018-20573 | LOW | 0.6.2-4ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2018-20573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20573
https://github.com/jbeder/yaml-cpp/issues/655
https://nvd.nist.gov/vuln/detail/CVE-2018-20573
| @@ -108,10 +108,10 @@ hide: | libyaml-cpp0.6 | CVE-2019-6292 | LOW | 0.6.2-4ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-6292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6292
https://github.com/jbeder/yaml-cpp/issues/657
https://nvd.nist.gov/vuln/detail/CVE-2019-6292
| | login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | mongodb-server-core | CVE-2021-32036 | MEDIUM | 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-32036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32036
https://jira.mongodb.org/browse/SERVER-59294
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| | wget | CVE-2021-31879 | MEDIUM | 1.20.3-1ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-31879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
| diff --git a/stable/storj-node/2.0.4/templates/common.yaml b/stable/omada-controller/6.0.9/templates/common.yaml similarity index 100% rename from stable/storj-node/2.0.4/templates/common.yaml rename to stable/omada-controller/6.0.9/templates/common.yaml diff --git a/stable/snipe-it/4.0.4/values.yaml b/stable/omada-controller/6.0.9/values.yaml similarity index 100% rename from stable/snipe-it/4.0.4/values.yaml rename to stable/omada-controller/6.0.9/values.yaml diff --git a/stable/plex/10.0.5/CHANGELOG.md b/stable/plex/10.0.5/CHANGELOG.md new file mode 100644 index 00000000000..aafb3d76581 --- /dev/null +++ b/stable/plex/10.0.5/CHANGELOG.md @@ -0,0 +1,99 @@ +# Changelog
+ + + +### [plex-10.0.5](https://github.com/truecharts/apps/compare/plex-10.0.4...plex-10.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + + +### [plex-10.0.4](https://github.com/truecharts/apps/compare/plex-10.0.3...plex-10.0.4) (2022-06-14) + +#### Chore + +* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886)) + + + + +### [plex-10.0.3](https://github.com/truecharts/apps/compare/plex-10.0.2...plex-10.0.3) (2022-06-11) + +#### Chore + +* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854)) + + + + +### [plex-10.0.2](https://github.com/truecharts/apps/compare/plex-10.0.1...plex-10.0.2) (2022-06-07) + +#### Fix + +* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format. + + + + +### [plex-10.0.1](https://github.com/truecharts/apps/compare/plex-9.0.25...plex-10.0.1) (2022-06-07) + +#### Chore + +* Auto-update chart README [skip ci] +* sync all apps persistence configuration and always default to PVC + +#### Fix + +* remove malfunctioning SCALE migration script + +#### Refactor + +* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) + + + + +### [plex-10.0.0](https://github.com/truecharts/apps/compare/plex-9.0.25...plex-10.0.0) (2022-06-07) + +#### Chore + +* sync all apps persistence configuration and always default to PVC + +#### Refactor + +* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) + + + + +### [plex-9.0.25](https://github.com/truecharts/apps/compare/plex-9.0.24...plex-9.0.25) (2022-06-03) + +#### Chore + +* update docker general non-major ([#2821](https://github.com/truecharts/apps/issues/2821)) + + + + +### [plex-9.0.24](https://github.com/truecharts/apps/compare/plex-9.0.23...plex-9.0.24) (2022-06-02) + +#### Chore + +* update docker general non-major ([#2817](https://github.com/truecharts/apps/issues/2817)) + + + + +### [plex-9.0.23](https://github.com/truecharts/apps/compare/plex-9.0.22...plex-9.0.23) (2022-05-31) + +#### Chore + +* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) + + + + +### [plex-9.0.22](https://github.com/truecharts/apps/compare/plex-9.0.21...plex-9.0.22) (2022-05-26) diff --git a/stable/storj-node/2.0.4/CONFIG.md b/stable/plex/10.0.5/CONFIG.md similarity index 100% rename from stable/storj-node/2.0.4/CONFIG.md rename to stable/plex/10.0.5/CONFIG.md diff --git a/stable/plex/10.0.5/Chart.lock b/stable/plex/10.0.5/Chart.lock new file mode 100644 index 00000000000..3d126bdf639 --- /dev/null +++ b/stable/plex/10.0.5/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:34:17.89937634Z" diff --git a/stable/plex/10.0.5/Chart.yaml b/stable/plex/10.0.5/Chart.yaml new file mode 100644 index 00000000000..0e62ca0e0ed --- /dev/null +++ b/stable/plex/10.0.5/Chart.yaml @@ -0,0 +1,28 @@ +apiVersion: v2 +appVersion: "1.27.0.589" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +deprecated: false +description: Plex Media Server +home: https://github.com/truecharts/apps/tree/master/charts/stable/plex +icon: https://truecharts.org/_static/img/appicons/plex.png +keywords: +- plex +- plex-media-server +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: plex +sources: +- https://github.com/k8s-at-home/container-images/pkgs/container/plex +type: application +version: 10.0.5 +annotations: + truecharts.org/catagories: | + - media + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/plex/10.0.5/README.md b/stable/plex/10.0.5/README.md new file mode 100644 index 00000000000..2603ba3573b --- /dev/null +++ b/stable/plex/10.0.5/README.md @@ -0,0 +1,37 @@ +# Introduction + +Plex Media Server + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 10.0.10 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/plex/10.0.5/app-readme.md b/stable/plex/10.0.5/app-readme.md new file mode 100644 index 00000000000..7a7b97fe944 --- /dev/null +++ b/stable/plex/10.0.5/app-readme.md @@ -0,0 +1,3 @@ +Plex Media Server + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/storj-node/2.0.4/charts/common-10.0.10.tgz b/stable/plex/10.0.5/charts/common-10.0.10.tgz similarity index 100% rename from stable/storj-node/2.0.4/charts/common-10.0.10.tgz rename to stable/plex/10.0.5/charts/common-10.0.10.tgz diff --git a/stable/plex/10.0.5/helm-values.md b/stable/plex/10.0.5/helm-values.md new file mode 100644 index 00000000000..27134f6633f --- /dev/null +++ b/stable/plex/10.0.5/helm-values.md @@ -0,0 +1,23 @@ +# Default Helm-Values + +TrueCharts is primarily build to supply TrueNAS SCALE Apps. +However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file. + +Most of our Apps also consume our "common" Helm Chart. +If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart. +You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document. + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| env.ALLOWED_NETWORKS | string | `"172.16.0.0/16"` | | +| image.pullPolicy | string | `"IfNotPresent"` | | +| image.repository | string | `"tccr.io/truecharts/plex"` | | +| image.tag | string | `"v1.25.8.5663@sha256:8f26eed9c289630978b894322d8233f6c6c212e4c92a3fcc35c03b36a1c466bb"` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| service.main.ports.main.port | int | `32400` | | +| service.main.ports.main.targetPort | int | `32400` | | + +All Rights Reserved - The TrueCharts Project diff --git a/stable/plex/10.0.5/ix_values.yaml b/stable/plex/10.0.5/ix_values.yaml new file mode 100644 index 00000000000..9b3b6da45f7 --- /dev/null +++ b/stable/plex/10.0.5/ix_values.yaml @@ -0,0 +1,20 @@ +image: + repository: tccr.io/truecharts/plex + pullPolicy: IfNotPresent + tag: v1.27.0.5897@sha256:d92066ab0fcd79a8de0f4372a8d8f1d89d83b834b82a2ab270aba8692bdb61d7 + +service: + main: + ports: + main: + port: 32400 + targetPort: 32400 + +persistence: + config: + enabled: true + mountPath: "/config" + + +env: + ALLOWED_NETWORKS: "172.16.0.0/16" diff --git a/stable/plex/10.0.5/questions.yaml b/stable/plex/10.0.5/questions.yaml new file mode 100644 index 00000000000..443e1859478 --- /dev/null +++ b/stable/plex/10.0.5/questions.yaml @@ -0,0 +1,2459 @@ +groups: + - name: "Container Image" + description: "Image to be used for container" + - name: "Controller" + description: "Configure workload deployment" + - name: "Container Configuration" + description: "additional container configuration" + - name: "App Configuration" + description: "App specific config options" + - name: "Networking and Services" + description: "Configure Network and Services for container" + - name: "Storage and Persistence" + description: "Persist and share data that is separate from the container" + - name: "Ingress" + description: "Ingress Configuration" + - name: "Security and Permissions" + description: "Configure security context and permissions" + - name: "Resources and Devices" + description: "Specify resources/devices to be allocated to workload" + - name: "Middlewares" + description: "Traefik Middlewares" + - name: "Metrics" + description: "Metrics" + - name: "Addons" + description: "Addon Configuration" + - name: "Advanced" + description: "Advanced Configuration" +portals: + open: + protocols: + - "$kubernetes-resource_configmap_portal_protocol" + host: + - "$kubernetes-resource_configmap_portal_host" + ports: + - "$kubernetes-resource_configmap_portal_port" + path: "/web" +questions: + - variable: portal + group: "Container Image" + label: "Configure Portal Button" + schema: + type: dict + hidden: true + attrs: + - variable: enabled + label: "Enable" + description: "enable the portal button" + schema: + hidden: true + editable: false + type: boolean + default: true + - variable: global + label: "global settings" + group: "Controller" + schema: + type: dict + hidden: true + attrs: + - variable: isSCALE + label: "flag this is SCALE" + schema: + type: boolean + default: true + hidden: true + - variable: controller + group: "Controller" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: advanced + label: "Show Advanced Controller Settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: type + description: "Please specify type of workload to deploy" + label: "(Advanced) Controller Type" + schema: + type: string + default: "deployment" + required: true + enum: + - value: "deployment" + description: "Deployment" + - value: "statefulset" + description: "Statefulset" + - value: "daemonset" + description: "Daemonset" + - variable: replicas + description: "Number of desired pod replicas" + label: "Desired Replicas" + schema: + type: int + default: 1 + required: true + - variable: strategy + description: "Please specify type of workload to deploy" + label: "(Advanced) Update Strategy" + schema: + type: string + default: "Recreate" + required: true + enum: + - value: "Recreate" + description: "Recreate: Kill existing pods before creating new ones" + - value: "RollingUpdate" + description: "RollingUpdate: Create new pods and then kill old ones" + - value: "OnDelete" + description: "(Legacy) OnDelete: ignore .spec.template changes" + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: extraArgs + label: "Extra Args" + schema: + type: list + default: [] + items: + - variable: arg + label: "arg" + schema: + type: string + - variable: labelsList + label: "Controller Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: " Controller Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: env + group: "Container Configuration" + label: "Image Environment" + schema: + additional_attrs: true + type: dict + attrs: + - variable: ADVERTISE_IP + label: "Advertise IP" + description: "IP to advertise to Plex" + schema: + type: string + default: "" + - variable: ALLOWED_NETWORKS + label: "Allowed Networks" + description: "Networks allowed to connect to plex. Add your local network IP to this list" + schema: + type: string + default: "172.16.0.0/12,10.0.0.0/8,192.168.0.0/16" + - variable: PLEX_CLAIM + label: "Plex Claim Token" + description: "Claim token to use to register the plex server (Max. 4 minutes old!). You can obtain a claim token to login your server to your plex account by visiting https://www.plex.tv/claim." + schema: + type: string + default: "" + + - variable: TZ + label: "Timezone" + group: "Container Configuration" + schema: + type: string + default: "Etc/UTC" + $ref: + - "definitions/timezone" + + - variable: envList + label: "Image environment" + group: "Container Configuration" + schema: + type: list + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: expertpodconf + group: "Container Configuration" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: tty + label: "Enable TTY" + description: "Determines whether containers in a pod runs with TTY enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: stdin + label: "Enable STDIN" + description: "Determines whether containers in a pod runs with stdin enabled. By default pod has it disabled." + group: "Workload Details" + schema: + type: boolean + default: false + - variable: termination + group: "Container Configuration" + label: "Termination settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: gracePeriodSeconds + label: "Grace Period Seconds" + schema: + type: int + default: 10 + - variable: podLabelsList + group: "Container Configuration" + label: "Pod Labels" + schema: + type: list + default: [] + items: + - variable: podLabelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: podAnnotationsList + group: "Container Configuration" + label: "Pod Annotations" + schema: + type: list + default: [] + items: + - variable: podAnnotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: service + group: "Networking and Services" + label: "Configure Service(s)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service" + description: "The Primary service on which the healthcheck runs, often the webUI" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "ClusterIP" + description: "ClusterIP" + - value: "NodePort" + description: "NodePort (Advanced)" + - value: "LoadBalancer" + description: "LoadBalancer (Advanced)" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ipFamilyPolicy + label: "IP Family Policy" + description: "(Advanced) Specify the ip policy" + schema: + show_if: [["type", "!=", "Simple"]] + type: string + default: "SingleStack" + enum: + - value: "SingleStack" + description: "SingleStack" + - value: "PreferDualStack" + description: "PreferDualStack" + - value: "RequireDualStack" + description: "RequireDualStack" + - variable: ipFamilies + label: "(advanced) IP families" + description: "(advanced) The ip families that should be used" + schema: + show_if: [["type", "!=", "Simple"]] + type: list + default: [] + items: + - variable: ipFamily + label: "IP family" + schema: + type: string + - variable: ports + label: "Service's Port(s) Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Service Port Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: port + label: "Port" + description: "This port exposes the container port on the service" + schema: + type: int + default: 32400 + required: true + - variable: advanced + label: "Show Advanced settings" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: protocol + label: "Port Type" + schema: + type: string + default: "HTTP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort, Simple or LoadBalancer" + schema: + type: int + min: 9000 + max: 65535 + - variable: targetPort + label: "Target Port" + description: "The internal(!) port on the container the Application runs on" + schema: + type: int + default: 32400 + + + - variable: serviceexpert + group: "Networking and Services" + label: "Show Expert Config" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hostNetwork + group: "Networking and Services" + label: "Host-Networking (Complicated)" + schema: + type: boolean + default: false + + - variable: externalInterfaces + description: "Add External Interfaces" + label: "Add external Interfaces" + group: "Networking" + schema: + type: list + items: + - variable: interfaceConfiguration + description: "Interface Configuration" + label: "Interface Configuration" + schema: + type: dict + $ref: + - "normalize/interfaceConfiguration" + attrs: + - variable: hostInterface + description: "Please specify host interface" + label: "Host Interface" + schema: + type: string + required: true + $ref: + - "definitions/interface" + - variable: ipam + description: "Define how IP Address will be managed" + label: "IP Address Management" + schema: + type: dict + required: true + attrs: + - variable: type + description: "Specify type for IPAM" + label: "IPAM Type" + schema: + type: string + required: true + enum: + - value: "dhcp" + description: "Use DHCP" + - value: "static" + description: "Use static IP" + show_subquestions_if: "static" + subquestions: + - variable: staticIPConfigurations + label: "Static IP Addresses" + schema: + type: list + items: + - variable: staticIP + label: "Static IP" + schema: + type: ipaddr + cidr: true + - variable: staticRoutes + label: "Static Routes" + schema: + type: list + items: + - variable: staticRouteConfiguration + label: "Static Route Configuration" + schema: + additional_attrs: true + type: dict + attrs: + - variable: destination + label: "Destination" + schema: + type: ipaddr + cidr: true + required: true + - variable: gateway + label: "Gateway" + schema: + type: ipaddr + cidr: false + required: true + + - variable: dnsPolicy + group: "Networking and Services" + label: "dnsPolicy" + schema: + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "ClusterFirst" + description: "ClusterFirst" + - value: "ClusterFirstWithHostNet" + description: "ClusterFirstWithHostNet" + - value: "None" + description: "None" + + - variable: dnsConfig + label: "DNS Configuration" + group: "Networking and Services" + description: "Specify custom DNS configuration which will be applied to the pod" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nameservers + label: "Nameservers" + schema: + default: [] + type: list + items: + - variable: nameserver + label: "Nameserver" + schema: + type: string + - variable: options + label: "options" + schema: + default: [] + type: list + items: + - variable: option + label: "Option Entry" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: searches + label: "Searches" + schema: + default: [] + type: list + items: + - variable: search + label: "Search Entry" + schema: + type: string + + - variable: serviceList + label: "Add Manual Custom Services" + group: "Networking and Services" + schema: + type: list + default: [] + items: + - variable: serviceListEntry + label: "Custom Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the service" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "Simple" + enum: + - value: "Simple" + description: "Simple" + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: portsList + label: "Additional Service Ports" + schema: + type: list + default: [] + items: + - variable: portsListEntry + label: "Custom ports" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the port" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Port Name" + schema: + type: string + default: "" + - variable: protocol + label: "Port Type" + schema: + type: string + default: "TCP" + enum: + - value: HTTP + description: "HTTP" + - value: "HTTPS" + description: "HTTPS" + - value: TCP + description: "TCP" + - value: "UDP" + description: "UDP" + - variable: targetPort + label: "Target Port" + description: "This port exposes the container port on the service" + schema: + type: int + required: true + - variable: port + label: "Container Port" + schema: + type: int + required: true + - variable: nodePort + label: "Node Port (Optional)" + description: "This port gets exposed to the node. Only considered when service type is NodePort" + schema: + type: int + min: 9000 + max: 65535 + + - variable: persistence + label: "Integrated Persistent Storage" + description: "Integrated Persistent Storage" + group: "Storage and Persistence" + schema: + additional_attrs: true + type: dict + attrs: + - variable: config + label: "App Config Storage" + description: "Stores the Application Configuration." + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simplePVC" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: persistenceList + label: "Additional app storage" + group: "Storage and Persistence" + schema: + type: list + default: [] + items: + - variable: persistenceListEntry + label: "Custom Storage" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name (optional)" + description: "Not required, please set to config when mounting /config or temp when mounting /tmp" + schema: + type: string + - variable: type + label: "Type of Storage" + description: "Sets the persistence type, Anything other than PVC could break rollback!" + schema: + type: string + default: "simpleHP" + enum: + - value: "simplePVC" + description: "PVC (simple)" + - value: "simpleHP" + description: "HostPath (simple)" + - value: "emptyDir" + description: "emptyDir" + - value: "pvc" + description: "pvc" + - value: "hostPath" + description: "hostPath" + - value: "nfs" + description: "NFS Share" + - variable: server + label: "NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: path + label: "Path on NFS server" + schema: + show_if: [["type", "=", "nfs"]] + type: string + default: "" + - variable: setPermissionsSimple + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "simpleHP"]] + type: boolean + default: true + - variable: setPermissions + label: "Automatic Permissions" + description: "Automatically set permissions on install" + schema: + show_if: [["type", "=", "hostPath"]] + type: boolean + default: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPathSimple + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "simpleHP"]] + type: hostpath + - variable: hostPath + label: "hostPath" + description: "Path inside the container the storage is mounted" + schema: + show_if: [["type", "=", "hostPath"]] + type: hostpath + - variable: mountPath + label: "mountPath" + description: "Path inside the container the storage is mounted" + schema: + type: string + default: "" + required: true + valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' + - variable: medium + label: "EmptyDir Medium" + schema: + show_if: [["type", "=", "emptyDir"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "Memory" + description: "Memory" + - variable: size + label: "Size quotum of storage" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "999Gi" + - variable: hostPathType + label: "(Advanced) hostPath Type" + schema: + show_if: [["type", "=", "hostPath"]] + type: string + default: "" + enum: + - value: "" + description: "Default" + - value: "DirectoryOrCreate" + description: "DirectoryOrCreate" + - value: "Directory" + description: "Directory" + - value: "FileOrCreate" + description: "FileOrCreate" + - value: "File" + description: "File" + - value: "Socket" + description: "Socket" + - value: "CharDevice" + description: "CharDevice" + - value: "BlockDevice" + description: "BlockDevice" + - variable: storageClass + label: "(Advanced) storageClass" + description: "Warning: Anything other than SCALE-ZFS or empty will break rollback!" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "SCALE-ZFS" + - variable: accessMode + label: "(Advanced) Access Mode" + description: "Allow or disallow multiple PVC's writhing to the same PV" + schema: + show_if: [["type", "=", "pvc"]] + type: string + default: "ReadWriteOnce" + enum: + - value: "ReadWriteOnce" + description: "ReadWriteOnce" + - value: "ReadOnlyMany" + description: "ReadOnlyMany" + - value: "ReadWriteMany" + description: "ReadWriteMany" + - variable: advanced + label: "Show Advanced Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingress + label: "" + group: "Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: main + label: "Main Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + + - variable: entrypoint + label: "(Advanced) Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: expert + label: "Show Expert Configuration Options" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: enableFixedMiddlewares + description: "These middlewares enforce a number of best practices." + label: "Enable Default Middlewares" + schema: + type: boolean + default: true + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + + - variable: ingressList + label: "Add Manual Custom Ingresses" + group: "Ingress" + schema: + type: list + default: [] + items: + - variable: ingressListEntry + label: "Custom Ingress" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable Ingress" + schema: + type: boolean + default: true + hidden: true + - variable: name + label: "Name" + schema: + type: string + default: "" + - variable: ingressClassName + label: "IngressClass Name" + schema: + type: string + default: "" + - variable: labelsList + label: "Labels" + schema: + type: list + default: [] + items: + - variable: labelItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: annotationsList + label: "Annotations" + schema: + type: list + default: [] + items: + - variable: annotationItem + label: "Label" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + - variable: value + label: "Value" + schema: + type: string + - variable: hosts + label: "Hosts" + schema: + type: list + default: [] + items: + - variable: hostEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: host + label: "HostName" + schema: + type: string + default: "" + required: true + - variable: paths + label: "Paths" + schema: + type: list + default: [] + items: + - variable: pathEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: path + label: "path" + schema: + type: string + required: true + default: "/" + - variable: pathType + label: "pathType" + schema: + type: string + required: true + default: "Prefix" + - variable: service + label: "Linked Service" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Service Name" + schema: + type: string + default: "" + - variable: port + label: "Service Port" + schema: + type: int + - variable: tls + label: "TLS-Settings" + schema: + type: list + default: [] + items: + - variable: tlsEntry + label: "Host" + schema: + additional_attrs: true + type: dict + attrs: + - variable: hosts + label: "Certificate Hosts" + schema: + type: list + default: [] + items: + - variable: host + label: "Host" + schema: + type: string + default: "" + required: true + - variable: scaleCert + label: "Select TrueNAS SCALE Certificate" + schema: + type: int + $ref: + - "definitions/certificate" + - variable: entrypoint + label: "Traefik Entrypoint" + description: "Entrypoint used by Traefik when using Traefik as Ingress Provider" + schema: + type: string + default: "websecure" + required: true + - variable: middlewares + label: "Traefik Middlewares" + description: "Add previously created Traefik Middlewares to this Ingress" + schema: + type: list + default: [] + items: + - variable: name + label: "Name" + schema: + type: string + default: "" + required: true + + - variable: security + label: "Container Security Settings" + group: "Security and Permissions" + schema: + type: dict + additional_attrs: true + attrs: + - variable: editsecurity + label: "Change PUID / UMASK values" + description: "By enabling this you override default set values." + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: PUID + label: "Process User ID - PUID" + description: "When supported by the container, this sets the User ID running the Application Process. Not supported by all Apps" + schema: + type: int + default: 568 + - variable: UMASK + label: "UMASK" + description: "When supported by the container, this sets the UMASK for tha App. Not supported by all Apps" + schema: + type: string + default: "002" + + - variable: advancedSecurity + label: "Show Advanced Security Settings" + group: "Security and Permissions" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: securityContext + label: "Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: privileged + label: "Privileged mode" + schema: + type: boolean + default: false + - variable: readOnlyRootFilesystem + label: "ReadOnly Root Filesystem" + schema: + type: boolean + default: true + - variable: allowPrivilegeEscalation + label: "Allow Privilege Escalation" + schema: + type: boolean + default: false + - variable: runAsNonRoot + label: "runAsNonRoot" + schema: + type: boolean + default: true + - variable: capabilities + label: "Capabilities" + schema: + additional_attrs: true + type: dict + attrs: + - variable: drop + label: "Drop Capability" + schema: + type: list + default: [] + items: + - variable: dropEntry + label: "" + schema: + type: string + - variable: add + label: "Add Capability" + schema: + type: list + default: [] + items: + - variable: addEntry + label: "" + schema: + type: string + + - variable: podSecurityContext + group: "Security and Permissions" + label: "Pod Security Context" + schema: + additional_attrs: true + type: dict + attrs: + - variable: runAsUser + label: "runAsUser" + description: "The UserID of the user running the application" + schema: + type: int + default: 568 + - variable: runAsGroup + label: "runAsGroup" + description: "The groupID this App of the user running the application" + schema: + type: int + default: 568 + - variable: fsGroup + label: "fsGroup" + description: "The group that should own ALL storage." + schema: + type: int + default: 568 + - variable: fsGroupChangePolicy + label: "When should we take ownership?" + schema: + type: string + default: "OnRootMismatch" + enum: + - value: "OnRootMismatch" + description: "OnRootMismatch" + - value: "Always" + description: "Always" + - variable: supplementalGroups + label: "supplemental Groups" + schema: + type: list + default: [] + items: + - variable: supplementalGroupsEntry + label: "supplemental Group" + schema: + type: int + + + - variable: advancedresources + label: "Set Custom Resource Limits/Requests (Advanced)" + group: "Resources and Devices" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: resources + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: limits + label: "Advanced Limit Resource Consumption" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "4000m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "8Gi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + - variable: requests + label: "Minimum Resources Required (request)" + schema: + additional_attrs: true + type: dict + attrs: + - variable: cpu + label: "CPU" + description: "1000m means 1 hyperthread. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "10m" + valid_chars: '^(?!^0(\.0|m|)$)([0-9]+)(\.[0-9]|m?)$' + - variable: memory + label: "RAM" + description: "1Gi means 1 Gibibyte RAM. Detailed info: https://truecharts.org/manual/indepth/validation/" + schema: + type: string + default: "50Mi" + valid_chars: '^(?!^0(e[0-9]|[EPTGMK]i?|)$)([0-9]+)(|[EPTGMK]i?|e[0-9]+)$' + + - variable: deviceList + label: "Mount USB devices" + group: "Resources and Devices" + schema: + type: list + default: [] + items: + - variable: deviceListEntry + label: "Device" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "Enable the storage" + schema: + type: boolean + default: true + - variable: type + label: "(Advanced) Type of Storage" + description: "Sets the persistence type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: readOnly + label: "readOnly" + schema: + type: boolean + default: false + - variable: hostPath + label: "Host Device Path" + description: "Path to the device on the host system" + schema: + type: path + - variable: mountPath + label: "Container Device Path" + description: "Path inside the container the device is mounted" + schema: + type: string + default: "/dev/ttyACM0" + + # Specify GPU configuration + - variable: scaleGPU + label: "GPU Configuration" + group: "Resources and Devices" + schema: + type: dict + $ref: + - "definitions/gpuConfiguration" + attrs: [] + +# - variable: autoscaling +# group: "Advanced" +# label: "(Advanced) Horizontal Pod Autoscaler" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: target +# label: "Target" +# description: "deployment name, defaults to main deployment" +# schema: +# type: string +# default: "" +# - variable: minReplicas +# label: "Minimum Replicas" +# schema: +# type: int +# default: 1 +# - variable: maxReplicas +# label: "Maximum Replicas" +# schema: +# type: int +# default: 5 +# - variable: targetCPUUtilizationPercentage +# label: "Target CPU Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: targetMemoryUtilizationPercentage +# label: "Target Memory Utilization Percentage" +# schema: +# type: int +# default: 80 +# - variable: networkPolicy +# group: "Advanced" +# label: "(Advanced) Network Policy" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: enabled +# label: "enabled" +# schema: +# type: boolean +# default: false +# show_subquestions_if: true +# subquestions: +# - variable: policyType +# label: "Policy Type" +# schema: +# type: string +# default: "" +# enum: +# - value: "" +# description: "Default" +# - value: "ingress" +# description: "Ingress" +# - value: "egress" +# description: "Egress" +# - value: "ingress-egress" +# description: "Ingress and Egress" +# - variable: egress +# label: "Egress" +# schema: +# type: list +# default: [] +# items: +# - variable: egressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: to +# label: "To" +# schema: +# type: list +# default: [] +# items: +# - variable: toEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" +# - variable: ingress +# label: "Ingress" +# schema: +# type: list +# default: [] +# items: +# - variable: ingressEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: from +# label: "From" +# schema: +# type: list +# default: [] +# items: +# - variable: fromEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: ipBlock +# label: "ipBlock" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: cidr +# label: "cidr" +# schema: +# type: string +# default: "" +# - variable: except +# label: "except" +# schema: +# type: list +# default: [] +# items: +# - variable: exceptint +# label: "" +# schema: +# type: string +# - variable: namespaceSelector +# label: "namespaceSelector" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: podSelector +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: matchExpressions +# label: "matchExpressions" +# schema: +# type: list +# default: [] +# items: +# - variable: expressionEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: key +# label: "Key" +# schema: +# type: string +# - variable: operator +# label: "operator" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "In" +# description: "In" +# - value: "NotIn" +# description: "NotIn" +# - value: "Exists " +# description: "Exists " +# - value: "DoesNotExist " +# description: "DoesNotExist " +# - variable: values +# label: "values" +# schema: +# type: list +# default: [] +# items: +# - variable: value +# label: "" +# schema: +# type: string +# - variable: ports +# label: "Ports" +# schema: +# type: list +# default: [] +# items: +# - variable: portsEntry +# label: "" +# schema: +# additional_attrs: true +# type: dict +# attrs: +# - variable: port +# label: "port" +# schema: +# type: int +# - variable: endPort +# label: "port" +# schema: +# type: int +# - variable: protocol +# label: "Protocol" +# schema: +# type: string +# default: "TCP" +# enum: +# - value: "TCP" +# description: "TCP" +# - value: "UDP" +# description: "UDP" +# - value: "SCTP" +# description: "SCTP" + + + - variable: addons + group: "Addons" + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: vpn + label: "VPN" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Type" + schema: + type: string + default: "disabled" + enum: + - value: "disabled" + description: "disabled" + - value: "openvpn" + description: "OpenVPN" + - value: "wireguard" + description: "Wireguard" + - variable: openvpn + label: "OpenVPN Settings" + schema: + type: dict + show_if: [["type", "=", "openvpn"]] + attrs: + - variable: username + label: "authentication username" + description: "authentication username, optional" + schema: + type: string + default: "" + - variable: password + label: "authentication password" + description: "authentication credentials" + schema: + type: string + default: "" + required: true + - variable: killSwitch + label: "Enable killswitch" + schema: + type: boolean + show_if: [["type", "!=", "disabled"]] + default: true + - variable: excludedNetworks_IPv4 + label: "Killswitch Excluded IPv4 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv4 + label: "IPv4 Network" + schema: + type: string + required: true + - variable: excludedNetworks_IPv6 + label: "Killswitch Excluded IPv6 networks" + description: "list of killswitch excluded ipv4 addresses" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: networkv6 + label: "IPv6 Network" + schema: + type: string + required: true + + - variable: configFile + label: "VPN Config File Location" + schema: + type: dict + show_if: [["type", "!=", "disabled"]] + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: true + hidden: true + - variable: type + label: "type" + schema: + type: string + default: "hostPath" + hidden: true + - variable: hostPathType + label: "hostPathType" + schema: + type: string + default: "File" + hidden: true + - variable: noMount + label: "noMount" + schema: + type: boolean + default: true + hidden: true + - variable: hostPath + label: "Full path to file" + description: "path to your local VPN config file for example: /mnt/tank/vpn.conf or /mnt/tank/vpn.ovpn" + schema: + type: string + default: "" + required: true + - variable: envList + label: "VPN environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + - variable: codeserver + label: "Codeserver" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: git + label: "Git Settings" + schema: + additional_attrs: true + type: dict + attrs: + - variable: deployKey + description: "Raw SSH private key" + label: "deployKey" + schema: + type: string + - variable: deployKeyBase64 + description: "Base64-encoded SSH private key. When both variables are set, the raw SSH key takes precedence" + label: "deployKeyBase64" + schema: + type: string + - variable: service + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: type + label: "Service Type" + description: "ClusterIP's are only internally available, nodePorts expose the container to the host node System, Loadbalancer exposes the service using the system loadbalancer" + schema: + type: string + default: "NodePort" + enum: + - value: "NodePort" + description: "NodePort" + - value: "ClusterIP" + description: "ClusterIP" + - value: "LoadBalancer" + description: "LoadBalancer" + - variable: loadBalancerIP + label: "LoadBalancer IP" + description: "LoadBalancerIP" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: string + default: "" + - variable: externalIPs + label: "External IP's" + description: "External IP's" + schema: + show_if: [["type", "=", "LoadBalancer"]] + type: list + default: [] + items: + - variable: externalIP + label: "External IP" + schema: + type: string + - variable: ports + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: codeserver + label: "" + schema: + additional_attrs: true + type: dict + attrs: + - variable: nodePort + description: "leave empty to disable" + label: "nodePort" + schema: + type: int + default: 36107 + - variable: envList + label: "Codeserver environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + - variable: promtail + label: "Promtail" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: loki + label: "Loki URL" + schema: + type: string + required: true + - variable: logs + label: "Log Paths" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: path + label: "Path" + schema: + type: string + required: true + - variable: args + label: "Promtail ecommand line arguments" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: arg + label: "Arg" + schema: + type: string + required: true + - variable: envList + label: "Promtail environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true + + + + + - variable: netshoot + label: "Netshoot" + schema: + additional_attrs: true + type: dict + attrs: + - variable: enabled + label: "enabled" + schema: + type: boolean + default: false + show_subquestions_if: true + subquestions: + - variable: envList + label: "Netshoot environment Variables" + schema: + type: list + show_if: [["type", "!=", "disabled"]] + default: [] + items: + - variable: envItem + label: "Environment Variable" + schema: + additional_attrs: true + type: dict + attrs: + - variable: name + label: "Name" + schema: + type: string + required: true + - variable: value + label: "Value" + schema: + type: string + required: true diff --git a/stable/plex/10.0.5/security.md b/stable/plex/10.0.5/security.md new file mode 100644 index 00000000000..a052586a8e9 --- /dev/null +++ b/stable/plex/10.0.5/security.md @@ -0,0 +1,239 @@ +--- +hide: + - toc +--- + +# Security Overview + + + +## Helm-Chart + +##### Scan Results + +#### Chart Object: plex/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-plex' of Deployment 'RELEASE-NAME-plex' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-plex' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-plex' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-plex' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-plex' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-plex' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/plex:v1.27.0.5897@sha256:d92066ab0fcd79a8de0f4372a8d8f1d89d83b834b82a2ab270aba8692bdb61d7 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/plex:v1.27.0.5897@sha256:d92066ab0fcd79a8de0f4372a8d8f1d89d83b834b82a2ab270aba8692bdb61d7 (ubuntu 20.04) + + +**ubuntu** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| +| curl | CVE-2022-27782 | MEDIUM | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| curl | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7ubuntu3 | 1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
https://ubuntu.com/security/notices/USN-5446-1
https://ubuntu.com/security/notices/USN-5446-2
| +| e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| libcom-err2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libcurl4 | CVE-2022-27782 | MEDIUM | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://hackerone.com/reports/1555796
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libcurl4 | CVE-2022-27781 | LOW | 7.68.0-1ubuntu2.10 | 7.68.0-1ubuntu2.11 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
| +| libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
| +| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libgssapi-krb5-2 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libk5crypto3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| +| libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libpcre2-8-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| +| libpcre2-8-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpython3.8-minimal | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libpython3.8-stdlib | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libsepol1 | CVE-2021-36084 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36085 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36086 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsepol1 | CVE-2021-36087 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| +| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| +| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| +| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| +| libsqlite3-0 | CVE-2021-36690 | LOW | 3.31.1-4ubuntu0.2 | 3.31.1-4ubuntu0.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| +| libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| libssl1.1 | CVE-2022-1292 | MEDIUM | 1.1.1f-1ubuntu2.12 | 1.1.1f-1ubuntu2.13 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| +| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.10+dfsg-5ubuntu0.20.04.2 | 2.9.10+dfsg-5ubuntu0.20.04.3 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| +| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| +| locales | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| openssl | CVE-2022-1292 | MEDIUM | 1.1.1f-1ubuntu2.12 | 1.1.1f-1ubuntu2.13 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| +| python3.8 | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| python3.8-minimal | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| +| unrar | CVE-2018-25018 | MEDIUM | 1:5.6.6-2build1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25018
https://github.com/aawc/unrar/releases
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unrar/OSV-2018-204.yaml
| +| unrar | CVE-2022-30333 | MEDIUM | 1:5.6.6-2build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30333
https://github.com/debian-calibre/unrar-nonfree/compare/upstream/6.1.6...upstream/6.1.7
https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz
https://www.rarlab.com/rar_add.htm
| +| unzip | CVE-2022-0529 | MEDIUM | 6.0-25ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0529
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0529
| +| unzip | CVE-2021-4217 | LOW | 6.0-25ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
| +| unzip | CVE-2022-0530 | LOW | 6.0-25ubuntu1 | |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-0530
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
https://github.com/ByteHackr/unzip_poc
https://nvd.nist.gov/vuln/detail/CVE-2022-0530
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
| +| vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| vim-common | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2022-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0261
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318
https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0318
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319
https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0361
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0368
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0392
| +| vim-common | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417
https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0417
| +| vim-common | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554
https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0554
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0572
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629
https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
https://nvd.nist.gov/vuln/detail/CVE-2022-0629
| +| vim-common | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)
https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/
https://nvd.nist.gov/vuln/detail/CVE-2022-1420
| +| vim-common | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)
https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1616
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1620
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-common | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)
https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-common | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-common | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/
| +| vim-common | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3973
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-common | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0443
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-common | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0729
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| vim-tiny | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2022-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0261
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318
https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0318
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319
https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0361
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0368
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0392
| +| vim-tiny | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417
https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0417
| +| vim-tiny | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554
https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0554
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0572
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629
https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
https://nvd.nist.gov/vuln/detail/CVE-2022-0629
| +| vim-tiny | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)
https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/
https://nvd.nist.gov/vuln/detail/CVE-2022-1420
| +| vim-tiny | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)
https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1616
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1620
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://ubuntu.com/security/notices/USN-5460-1
| +| vim-tiny | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)
https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-tiny | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| vim-tiny | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/
| +| vim-tiny | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3973
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| vim-tiny | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0443
https://ubuntu.com/security/notices/USN-5458-1
| +| vim-tiny | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0729
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
| +| xxd | CVE-2021-4192 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-0213 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2022-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0213
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0261 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0261
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)
https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
https://linux.oracle.com/cve/CVE-2022-0261.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0261
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-0318 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318
https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
https://linux.oracle.com/cve/CVE-2022-0318.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0318
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-0319 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319
https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0361 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
https://linux.oracle.com/cve/CVE-2022-0361.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0361
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0368 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0368
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0392 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0392
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a (v8.2.4218)
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
https://linux.oracle.com/cve/CVE-2022-0392.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0392
| +| xxd | CVE-2022-0408 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247)
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0417 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417
https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0417
| +| xxd | CVE-2022-0554 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554
https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0554
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0572 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f (v8.2.4359)
https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GOY5YWTP5QUY2EFLCL7AUWA2CV57C37/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0572
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0629 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629
https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UURGABNDL77YR5FRQKTFBYNBDQX2KO7Q/
https://nvd.nist.gov/vuln/detail/CVE-2022-0629
| +| xxd | CVE-2022-0685 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 (v8.2.4418)
https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0714 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa (v8.2.4436)
https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-0943 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563)
https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3R36VSLO4TRX72SWB6IDJOD24BQXPX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1154 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-1552.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2022-1420 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)
https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVPZVE2CIE2NGCHZDMEHPBWN3LK2UQAA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6E457NYOIRWBJHKB7ON44UY5AVTG4HU/
https://nvd.nist.gov/vuln/detail/CVE-2022-1420
| +| xxd | CVE-2022-1616 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c (v8.2.4895)
https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1616
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1619 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1620 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1620
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1620
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1621 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://ubuntu.com/security/notices/USN-5460-1
| +| xxd | CVE-2022-1927 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037)
https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZSLFIKFYU5Y2KM5EJKQNYHWRUBDQ4GJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| xxd | CVE-2022-1942 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d (v8.2.5043)
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
| +| xxd | CVE-2022-1968 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b/
| +| xxd | CVE-2021-3973 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3973
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
| +| xxd | CVE-2021-4193 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0443 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281)
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0443
https://ubuntu.com/security/notices/USN-5458-1
| +| xxd | CVE-2022-0729 | LOW | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440)
https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLEHVP4LNAGER4ZDGUDS5V5YVQD6INF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBUYQBZ6GWAWJRWP7AODJ4KHW5BCKDVP/
https://nvd.nist.gov/vuln/detail/CVE-2022-0729
https://ubuntu.com/security/notices/USN-5460-1
| diff --git a/stable/trilium-notes/5.0.1/templates/common.yaml b/stable/plex/10.0.5/templates/common.yaml similarity index 100% rename from stable/trilium-notes/5.0.1/templates/common.yaml rename to stable/plex/10.0.5/templates/common.yaml diff --git a/stable/storj-node/2.0.4/values.yaml b/stable/plex/10.0.5/values.yaml similarity index 100% rename from stable/storj-node/2.0.4/values.yaml rename to stable/plex/10.0.5/values.yaml diff --git a/stable/prometheus/4.0.7/CHANGELOG.md b/stable/prometheus/4.0.8/CHANGELOG.md similarity index 91% rename from stable/prometheus/4.0.7/CHANGELOG.md rename to stable/prometheus/4.0.8/CHANGELOG.md index 6313b986248..aa7dc35594e 100644 --- a/stable/prometheus/4.0.7/CHANGELOG.md +++ b/stable/prometheus/4.0.8/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prometheus-4.0.8](https://github.com/truecharts/apps/compare/prometheus-4.0.7...prometheus-4.0.8) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [prometheus-4.0.7](https://github.com/truecharts/apps/compare/prometheus-4.0.6...prometheus-4.0.7) (2022-06-14) @@ -88,12 +97,3 @@ ### [prometheus-4.0.0](https://github.com/truecharts/apps/compare/prometheus-3.0.1...prometheus-4.0.0) (2022-06-07) -#### Chore - -* update helm general major helm releases ([#2804](https://github.com/truecharts/apps/issues/2804)) - -#### Fix - -* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format. - - diff --git a/stable/synapse/4.0.3/CONFIG.md b/stable/prometheus/4.0.8/CONFIG.md similarity index 100% rename from stable/synapse/4.0.3/CONFIG.md rename to stable/prometheus/4.0.8/CONFIG.md diff --git a/stable/prometheus/4.0.7/Chart.lock b/stable/prometheus/4.0.8/Chart.lock similarity index 89% rename from stable/prometheus/4.0.7/Chart.lock rename to stable/prometheus/4.0.8/Chart.lock index 147298927b8..eb17bbc4da1 100644 --- a/stable/prometheus/4.0.7/Chart.lock +++ b/stable/prometheus/4.0.8/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 3.1.0 digest: sha256:70028e119375ae178b1b5bb8454f11f0f2eb2a192c1203ffbdf06b2000dc772a -generated: "2022-06-14T19:03:55.501460133Z" +generated: "2022-06-15T07:34:34.700270363Z" diff --git a/stable/prometheus/4.0.7/Chart.yaml b/stable/prometheus/4.0.8/Chart.yaml similarity index 98% rename from stable/prometheus/4.0.7/Chart.yaml rename to stable/prometheus/4.0.8/Chart.yaml index ccc503251ef..b70d894dbc3 100644 --- a/stable/prometheus/4.0.7/Chart.yaml +++ b/stable/prometheus/4.0.8/Chart.yaml @@ -28,7 +28,7 @@ sources: - https://github.com/prometheus-community/helm-charts - https://github.com/prometheus-operator/kube-prometheus type: application -version: 4.0.7 +version: 4.0.8 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/prometheus/4.0.7/README.md b/stable/prometheus/4.0.8/README.md similarity index 100% rename from stable/prometheus/4.0.7/README.md rename to stable/prometheus/4.0.8/README.md diff --git a/stable/prometheus/4.0.7/app-readme.md b/stable/prometheus/4.0.8/app-readme.md similarity index 100% rename from stable/prometheus/4.0.7/app-readme.md rename to stable/prometheus/4.0.8/app-readme.md diff --git a/stable/synapse/4.0.3/charts/common-10.0.10.tgz b/stable/prometheus/4.0.8/charts/common-10.0.10.tgz similarity index 100% rename from stable/synapse/4.0.3/charts/common-10.0.10.tgz rename to stable/prometheus/4.0.8/charts/common-10.0.10.tgz diff --git a/stable/prometheus/4.0.7/charts/kube-state-metrics-3.1.0.tgz b/stable/prometheus/4.0.8/charts/kube-state-metrics-3.1.0.tgz similarity index 100% rename from stable/prometheus/4.0.7/charts/kube-state-metrics-3.1.0.tgz rename to stable/prometheus/4.0.8/charts/kube-state-metrics-3.1.0.tgz diff --git a/stable/prometheus/4.0.7/charts/node-exporter-3.0.3.tgz b/stable/prometheus/4.0.8/charts/node-exporter-3.0.3.tgz similarity index 100% rename from stable/prometheus/4.0.7/charts/node-exporter-3.0.3.tgz rename to stable/prometheus/4.0.8/charts/node-exporter-3.0.3.tgz diff --git a/stable/prometheus/4.0.7/crds/crd-alertmanager-config.yaml b/stable/prometheus/4.0.8/crds/crd-alertmanager-config.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-alertmanager-config.yaml rename to stable/prometheus/4.0.8/crds/crd-alertmanager-config.yaml diff --git a/stable/prometheus/4.0.7/crds/crd-alertmanager.yaml b/stable/prometheus/4.0.8/crds/crd-alertmanager.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-alertmanager.yaml rename to stable/prometheus/4.0.8/crds/crd-alertmanager.yaml diff --git a/stable/prometheus/4.0.7/crds/crd-podmonitor.yaml b/stable/prometheus/4.0.8/crds/crd-podmonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-podmonitor.yaml rename to stable/prometheus/4.0.8/crds/crd-podmonitor.yaml diff --git a/stable/prometheus/4.0.7/crds/crd-probes.yaml b/stable/prometheus/4.0.8/crds/crd-probes.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-probes.yaml rename to stable/prometheus/4.0.8/crds/crd-probes.yaml diff --git a/stable/prometheus/4.0.7/crds/crd-prometheus.yaml b/stable/prometheus/4.0.8/crds/crd-prometheus.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-prometheus.yaml rename to stable/prometheus/4.0.8/crds/crd-prometheus.yaml diff --git a/stable/prometheus/4.0.7/crds/crd-prometheusrules.yaml b/stable/prometheus/4.0.8/crds/crd-prometheusrules.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-prometheusrules.yaml rename to stable/prometheus/4.0.8/crds/crd-prometheusrules.yaml diff --git a/stable/prometheus/4.0.7/crds/crd-servicemonitor.yaml b/stable/prometheus/4.0.8/crds/crd-servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-servicemonitor.yaml rename to stable/prometheus/4.0.8/crds/crd-servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/crds/crd-thanosrulers.yaml b/stable/prometheus/4.0.8/crds/crd-thanosrulers.yaml similarity index 100% rename from stable/prometheus/4.0.7/crds/crd-thanosrulers.yaml rename to stable/prometheus/4.0.8/crds/crd-thanosrulers.yaml diff --git a/stable/prometheus/4.0.7/helm-values.md b/stable/prometheus/4.0.8/helm-values.md similarity index 100% rename from stable/prometheus/4.0.7/helm-values.md rename to stable/prometheus/4.0.8/helm-values.md diff --git a/stable/prometheus/4.0.7/ix_values.yaml b/stable/prometheus/4.0.8/ix_values.yaml similarity index 99% rename from stable/prometheus/4.0.7/ix_values.yaml rename to stable/prometheus/4.0.8/ix_values.yaml index 8ffc180b703..a4e20d1f983 100644 --- a/stable/prometheus/4.0.7/ix_values.yaml +++ b/stable/prometheus/4.0.8/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/prometheus-operator - tag: v0.57.0@sha256:7c613ef1bf0ba8b1b9aa1dfb7423dd0f786c0a445e3050eff5e4cd1db662a652 + tag: v0.57.0@sha256:934d1a143572d04205afe4023c1f0a889827172b4140c11bed7a4eec77ea51ed prometheusImage: repository: tccr.io/truecharts/prometheus diff --git a/stable/prometheus/4.0.7/questions.yaml b/stable/prometheus/4.0.8/questions.yaml similarity index 100% rename from stable/prometheus/4.0.7/questions.yaml rename to stable/prometheus/4.0.8/questions.yaml diff --git a/stable/prometheus/4.0.7/security.md b/stable/prometheus/4.0.8/security.md similarity index 99% rename from stable/prometheus/4.0.7/security.md rename to stable/prometheus/4.0.8/security.md index 60945c2c95b..b2740889f38 100644 --- a/stable/prometheus/4.0.7/security.md +++ b/stable/prometheus/4.0.8/security.md @@ -172,7 +172,7 @@ hide: docker.io/bitnami/node-exporter:1.3.1-debian-11-r3 docker.io/bitnami/kube-state-metrics:2.5.0-debian-11-r3 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/prometheus-operator:v0.57.0@sha256:7c613ef1bf0ba8b1b9aa1dfb7423dd0f786c0a445e3050eff5e4cd1db662a652 + tccr.io/truecharts/prometheus-operator:v0.57.0@sha256:934d1a143572d04205afe4023c1f0a889827172b4140c11bed7a4eec77ea51ed ##### Scan Results @@ -252,10 +252,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -272,8 +272,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -281,8 +281,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -384,10 +384,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -404,8 +404,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -413,8 +413,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -448,7 +448,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/prometheus-operator:v0.57.0@sha256:7c613ef1bf0ba8b1b9aa1dfb7423dd0f786c0a445e3050eff5e4cd1db662a652 (debian 11.3) +#### Container: tccr.io/truecharts/prometheus-operator:v0.57.0@sha256:934d1a143572d04205afe4023c1f0a889827172b4140c11bed7a4eec77ea51ed (debian 11.3) **debian** @@ -523,10 +523,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -543,8 +543,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -552,8 +552,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| diff --git a/stable/prometheus/4.0.7/templates/_helpers.tpl b/stable/prometheus/4.0.8/templates/_helpers.tpl similarity index 100% rename from stable/prometheus/4.0.7/templates/_helpers.tpl rename to stable/prometheus/4.0.8/templates/_helpers.tpl diff --git a/stable/prometheus/4.0.7/templates/alertmanager/_alertmanager.tpl b/stable/prometheus/4.0.8/templates/alertmanager/_alertmanager.tpl similarity index 100% rename from stable/prometheus/4.0.7/templates/alertmanager/_alertmanager.tpl rename to stable/prometheus/4.0.8/templates/alertmanager/_alertmanager.tpl diff --git a/stable/prometheus/4.0.7/templates/alertmanager/secrets.yaml b/stable/prometheus/4.0.8/templates/alertmanager/secrets.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/alertmanager/secrets.yaml rename to stable/prometheus/4.0.8/templates/alertmanager/secrets.yaml diff --git a/stable/prometheus/4.0.7/templates/alertmanager/serviceaccount.yaml b/stable/prometheus/4.0.8/templates/alertmanager/serviceaccount.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/alertmanager/serviceaccount.yaml rename to stable/prometheus/4.0.8/templates/alertmanager/serviceaccount.yaml diff --git a/stable/prometheus/4.0.7/templates/alertmanager/servicemonitor.yaml b/stable/prometheus/4.0.8/templates/alertmanager/servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/alertmanager/servicemonitor.yaml rename to stable/prometheus/4.0.8/templates/alertmanager/servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/templates/common.yaml b/stable/prometheus/4.0.8/templates/common.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/common.yaml rename to stable/prometheus/4.0.8/templates/common.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/core-dns/service.yaml b/stable/prometheus/4.0.8/templates/exporters/core-dns/service.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/core-dns/service.yaml rename to stable/prometheus/4.0.8/templates/exporters/core-dns/service.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/core-dns/servicemonitor.yaml b/stable/prometheus/4.0.8/templates/exporters/core-dns/servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/core-dns/servicemonitor.yaml rename to stable/prometheus/4.0.8/templates/exporters/core-dns/servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kube-apiserver/servicemonitor.yaml b/stable/prometheus/4.0.8/templates/exporters/kube-apiserver/servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kube-apiserver/servicemonitor.yaml rename to stable/prometheus/4.0.8/templates/exporters/kube-apiserver/servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kube-controller-manager/endpoints.yaml b/stable/prometheus/4.0.8/templates/exporters/kube-controller-manager/endpoints.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kube-controller-manager/endpoints.yaml rename to stable/prometheus/4.0.8/templates/exporters/kube-controller-manager/endpoints.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kube-controller-manager/service.yaml b/stable/prometheus/4.0.8/templates/exporters/kube-controller-manager/service.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kube-controller-manager/service.yaml rename to stable/prometheus/4.0.8/templates/exporters/kube-controller-manager/service.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kube-controller-manager/servicemonitor.yaml b/stable/prometheus/4.0.8/templates/exporters/kube-controller-manager/servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kube-controller-manager/servicemonitor.yaml rename to stable/prometheus/4.0.8/templates/exporters/kube-controller-manager/servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kube-scheduler/endpoints.yaml b/stable/prometheus/4.0.8/templates/exporters/kube-scheduler/endpoints.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kube-scheduler/endpoints.yaml rename to stable/prometheus/4.0.8/templates/exporters/kube-scheduler/endpoints.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kube-scheduler/service.yaml b/stable/prometheus/4.0.8/templates/exporters/kube-scheduler/service.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kube-scheduler/service.yaml rename to stable/prometheus/4.0.8/templates/exporters/kube-scheduler/service.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kube-scheduler/servicemonitor.yaml b/stable/prometheus/4.0.8/templates/exporters/kube-scheduler/servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kube-scheduler/servicemonitor.yaml rename to stable/prometheus/4.0.8/templates/exporters/kube-scheduler/servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/templates/exporters/kubelet/servicemonitor.yaml b/stable/prometheus/4.0.8/templates/exporters/kubelet/servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/exporters/kubelet/servicemonitor.yaml rename to stable/prometheus/4.0.8/templates/exporters/kubelet/servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/templates/operator/_args.tpl b/stable/prometheus/4.0.8/templates/operator/_args.tpl similarity index 100% rename from stable/prometheus/4.0.7/templates/operator/_args.tpl rename to stable/prometheus/4.0.8/templates/operator/_args.tpl diff --git a/stable/prometheus/4.0.7/templates/operator/configmap.yaml b/stable/prometheus/4.0.8/templates/operator/configmap.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/operator/configmap.yaml rename to stable/prometheus/4.0.8/templates/operator/configmap.yaml diff --git a/stable/prometheus/4.0.7/templates/operator/servicemonitor.yaml b/stable/prometheus/4.0.8/templates/operator/servicemonitor.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/operator/servicemonitor.yaml rename to stable/prometheus/4.0.8/templates/operator/servicemonitor.yaml diff --git a/stable/prometheus/4.0.7/templates/prometheus/_additionalPrometheusRules.tpl b/stable/prometheus/4.0.8/templates/prometheus/_additionalPrometheusRules.tpl similarity index 100% rename from stable/prometheus/4.0.7/templates/prometheus/_additionalPrometheusRules.tpl rename to stable/prometheus/4.0.8/templates/prometheus/_additionalPrometheusRules.tpl diff --git a/stable/prometheus/4.0.7/templates/prometheus/_additionalScrapeJobs.tpl b/stable/prometheus/4.0.8/templates/prometheus/_additionalScrapeJobs.tpl similarity index 100% rename from stable/prometheus/4.0.7/templates/prometheus/_additionalScrapeJobs.tpl rename to stable/prometheus/4.0.8/templates/prometheus/_additionalScrapeJobs.tpl diff --git a/stable/prometheus/4.0.7/templates/prometheus/_prometheus.tpl b/stable/prometheus/4.0.8/templates/prometheus/_prometheus.tpl similarity index 100% rename from stable/prometheus/4.0.7/templates/prometheus/_prometheus.tpl rename to stable/prometheus/4.0.8/templates/prometheus/_prometheus.tpl diff --git a/stable/prometheus/4.0.7/templates/prometheus/_servicemonitor.tpl b/stable/prometheus/4.0.8/templates/prometheus/_servicemonitor.tpl similarity index 100% rename from stable/prometheus/4.0.7/templates/prometheus/_servicemonitor.tpl rename to stable/prometheus/4.0.8/templates/prometheus/_servicemonitor.tpl diff --git a/stable/prometheus/4.0.7/templates/prometheus/clusterrole.yaml b/stable/prometheus/4.0.8/templates/prometheus/clusterrole.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/prometheus/clusterrole.yaml rename to stable/prometheus/4.0.8/templates/prometheus/clusterrole.yaml diff --git a/stable/prometheus/4.0.7/templates/prometheus/clusterrolebinding.yaml b/stable/prometheus/4.0.8/templates/prometheus/clusterrolebinding.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/prometheus/clusterrolebinding.yaml rename to stable/prometheus/4.0.8/templates/prometheus/clusterrolebinding.yaml diff --git a/stable/prometheus/4.0.7/templates/prometheus/serviceaccount.yaml b/stable/prometheus/4.0.8/templates/prometheus/serviceaccount.yaml similarity index 100% rename from stable/prometheus/4.0.7/templates/prometheus/serviceaccount.yaml rename to stable/prometheus/4.0.8/templates/prometheus/serviceaccount.yaml diff --git a/stable/synapse/4.0.3/values.yaml b/stable/prometheus/4.0.8/values.yaml similarity index 100% rename from stable/synapse/4.0.3/values.yaml rename to stable/prometheus/4.0.8/values.yaml diff --git a/stable/rsshub/3.0.8/CHANGELOG.md b/stable/rsshub/3.0.9/CHANGELOG.md similarity index 92% rename from stable/rsshub/3.0.8/CHANGELOG.md rename to stable/rsshub/3.0.9/CHANGELOG.md index 6f67375f03b..761d02721ae 100644 --- a/stable/rsshub/3.0.8/CHANGELOG.md +++ b/stable/rsshub/3.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [rsshub-3.0.9](https://github.com/truecharts/apps/compare/rsshub-3.0.8...rsshub-3.0.9) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [rsshub-3.0.8](https://github.com/truecharts/apps/compare/rsshub-3.0.7...rsshub-3.0.8) (2022-06-14) @@ -88,12 +97,3 @@ ### [rsshub-3.0.1](https://github.com/truecharts/apps/compare/rsshub-3.0.0...rsshub-3.0.1) (2022-06-08) - -#### Chore - -* update docker general non-major ([#2839](https://github.com/truecharts/apps/issues/2839)) - - - - -### [rsshub-3.0.0](https://github.com/truecharts/apps/compare/rsshub-2.0.1...rsshub-3.0.0) (2022-06-07) diff --git a/stable/trilium-notes/5.0.1/CONFIG.md b/stable/rsshub/3.0.9/CONFIG.md similarity index 100% rename from stable/trilium-notes/5.0.1/CONFIG.md rename to stable/rsshub/3.0.9/CONFIG.md diff --git a/stable/rsshub/3.0.8/Chart.lock b/stable/rsshub/3.0.9/Chart.lock similarity index 85% rename from stable/rsshub/3.0.8/Chart.lock rename to stable/rsshub/3.0.9/Chart.lock index d7988e8dcdc..9faf0d41788 100644 --- a/stable/rsshub/3.0.8/Chart.lock +++ b/stable/rsshub/3.0.9/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org version: 3.0.7 digest: sha256:4b715113d39e117d6d4d509c18bd1e1e8ac24b9185c28035b3d8c43552c7130d -generated: "2022-06-14T19:04:59.687528864Z" +generated: "2022-06-15T07:34:51.162129271Z" diff --git a/stable/rsshub/3.0.8/Chart.yaml b/stable/rsshub/3.0.9/Chart.yaml similarity index 98% rename from stable/rsshub/3.0.8/Chart.yaml rename to stable/rsshub/3.0.9/Chart.yaml index b171edd5c99..c078ac4e687 100644 --- a/stable/rsshub/3.0.8/Chart.yaml +++ b/stable/rsshub/3.0.9/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: rsshub -version: 3.0.8 +version: 3.0.9 appVersion: "latest" description: RSSHub can generate RSS feeds from pretty much everything type: application diff --git a/stable/rsshub/3.0.8/README.md b/stable/rsshub/3.0.9/README.md similarity index 100% rename from stable/rsshub/3.0.8/README.md rename to stable/rsshub/3.0.9/README.md diff --git a/stable/rsshub/3.0.8/app-readme.md b/stable/rsshub/3.0.9/app-readme.md similarity index 100% rename from stable/rsshub/3.0.8/app-readme.md rename to stable/rsshub/3.0.9/app-readme.md diff --git a/stable/trilium-notes/5.0.1/charts/common-10.0.10.tgz b/stable/rsshub/3.0.9/charts/common-10.0.10.tgz similarity index 100% rename from stable/trilium-notes/5.0.1/charts/common-10.0.10.tgz rename to stable/rsshub/3.0.9/charts/common-10.0.10.tgz diff --git a/stable/rsshub/3.0.8/charts/redis-3.0.7.tgz b/stable/rsshub/3.0.9/charts/redis-3.0.7.tgz similarity index 100% rename from stable/rsshub/3.0.8/charts/redis-3.0.7.tgz rename to stable/rsshub/3.0.9/charts/redis-3.0.7.tgz diff --git a/stable/rsshub/3.0.8/helm-values.md b/stable/rsshub/3.0.9/helm-values.md similarity index 100% rename from stable/rsshub/3.0.8/helm-values.md rename to stable/rsshub/3.0.9/helm-values.md diff --git a/stable/rsshub/3.0.8/ix_values.yaml b/stable/rsshub/3.0.9/ix_values.yaml similarity index 93% rename from stable/rsshub/3.0.8/ix_values.yaml rename to stable/rsshub/3.0.9/ix_values.yaml index 6cca5de7b97..2e0613f6411 100644 --- a/stable/rsshub/3.0.8/ix_values.yaml +++ b/stable/rsshub/3.0.9/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/rsshub pullPolicy: IfNotPresent - tag: latest@sha256:5ef8105657f071602f6f2880bb09f5546af1fb7feebb58854050d2976bdf0f65 + tag: latest@sha256:fecb3e57bc495947cb9338244db3ba7ef561ad54fbeb024ff245a19c2238267f browserlessImage: repository: tccr.io/truecharts/browserless-chrome diff --git a/stable/rsshub/3.0.8/questions.yaml b/stable/rsshub/3.0.9/questions.yaml similarity index 100% rename from stable/rsshub/3.0.8/questions.yaml rename to stable/rsshub/3.0.9/questions.yaml diff --git a/stable/rsshub/3.0.8/security.md b/stable/rsshub/3.0.9/security.md similarity index 99% rename from stable/rsshub/3.0.8/security.md rename to stable/rsshub/3.0.9/security.md index 966816751f1..b4dfcf77425 100644 --- a/stable/rsshub/3.0.8/security.md +++ b/stable/rsshub/3.0.9/security.md @@ -62,7 +62,7 @@ hide: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 tccr.io/truecharts/redis:v7.0.2@sha256:1260b1716a9b5062f0f4bbd0bf213adcc64c822f429c9c094f22291ae903ded8 tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 - tccr.io/truecharts/rsshub:latest@sha256:5ef8105657f071602f6f2880bb09f5546af1fb7feebb58854050d2976bdf0f65 + tccr.io/truecharts/rsshub:latest@sha256:fecb3e57bc495947cb9338244db3ba7ef561ad54fbeb024ff245a19c2238267f - 'tccr.io/truecharts/browserless-chrome:v1.53.0-chrome@sha256:bba7c84a5c8c3c2b9518d8543f08b3669eeeda16837af4dc4c8065b7d87be08e' ##### Scan Results @@ -164,10 +164,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -184,8 +184,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -193,8 +193,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -235,7 +235,7 @@ hide: | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/rsshub:latest@sha256:5ef8105657f071602f6f2880bb09f5546af1fb7feebb58854050d2976bdf0f65 (debian 11.3) +#### Container: tccr.io/truecharts/rsshub:latest@sha256:fecb3e57bc495947cb9338244db3ba7ef561ad54fbeb024ff245a19c2238267f (debian 11.3) **debian** @@ -299,8 +299,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -309,10 +309,10 @@ hide: | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | logsave | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| diff --git a/stable/rsshub/3.0.9/templates/common.yaml b/stable/rsshub/3.0.9/templates/common.yaml new file mode 100644 index 00000000000..c1a366e1cf0 --- /dev/null +++ b/stable/rsshub/3.0.9/templates/common.yaml @@ -0,0 +1 @@ +{{ include "tc.common.loader.all" . }} diff --git a/stable/trilium-notes/5.0.1/values.yaml b/stable/rsshub/3.0.9/values.yaml similarity index 100% rename from stable/trilium-notes/5.0.1/values.yaml rename to stable/rsshub/3.0.9/values.yaml diff --git a/stable/snipe-it/4.0.4/CHANGELOG.md b/stable/snipe-it/4.0.5/CHANGELOG.md similarity index 91% rename from stable/snipe-it/4.0.4/CHANGELOG.md rename to stable/snipe-it/4.0.5/CHANGELOG.md index 5cc618a390c..1000e87c424 100644 --- a/stable/snipe-it/4.0.4/CHANGELOG.md +++ b/stable/snipe-it/4.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [snipe-it-4.0.5](https://github.com/truecharts/apps/compare/snipe-it-4.0.4...snipe-it-4.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [snipe-it-4.0.4](https://github.com/truecharts/apps/compare/snipe-it-4.0.3...snipe-it-4.0.4) (2022-06-14) @@ -88,12 +97,3 @@ #### Chore * update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) - - - - -### [snipe-it-2.0.26](https://github.com/truecharts/apps/compare/snipe-it-2.0.25...snipe-it-2.0.26) (2022-05-26) - -#### Chore - -* Auto-update chart README [skip ci] diff --git a/stable/snipe-it/4.0.5/CONFIG.md b/stable/snipe-it/4.0.5/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/snipe-it/4.0.5/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/snipe-it/4.0.4/Chart.lock b/stable/snipe-it/4.0.5/Chart.lock similarity index 88% rename from stable/snipe-it/4.0.4/Chart.lock rename to stable/snipe-it/4.0.5/Chart.lock index 59c97cbe5bd..8e02744ec06 100644 --- a/stable/snipe-it/4.0.4/Chart.lock +++ b/stable/snipe-it/4.0.5/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.truecharts.org version: 3.0.7 digest: sha256:5725b1df7270e531c855e8a95d9ba6539d77af6eb88c72d4239b0d3ac16a93b3 -generated: "2022-06-14T19:05:43.203887093Z" +generated: "2022-06-15T07:35:05.857174447Z" diff --git a/stable/snipe-it/4.0.4/Chart.yaml b/stable/snipe-it/4.0.5/Chart.yaml similarity index 96% rename from stable/snipe-it/4.0.4/Chart.yaml rename to stable/snipe-it/4.0.5/Chart.yaml index 0522e57409c..c9f5a586468 100644 --- a/stable/snipe-it/4.0.4/Chart.yaml +++ b/stable/snipe-it/4.0.5/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "6.0.2" +appVersion: "6.0.4" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -29,7 +29,7 @@ name: snipe-it sources: - https://snipeitapp.com/ - https://hub.docker.com/r/linuxserver/ -version: 4.0.4 +version: 4.0.5 annotations: truecharts.org/catagories: | - management diff --git a/stable/snipe-it/4.0.4/README.md b/stable/snipe-it/4.0.5/README.md similarity index 100% rename from stable/snipe-it/4.0.4/README.md rename to stable/snipe-it/4.0.5/README.md diff --git a/stable/snipe-it/4.0.4/app-readme.md b/stable/snipe-it/4.0.5/app-readme.md similarity index 100% rename from stable/snipe-it/4.0.4/app-readme.md rename to stable/snipe-it/4.0.5/app-readme.md diff --git a/stable/snipe-it/4.0.5/charts/common-10.0.10.tgz b/stable/snipe-it/4.0.5/charts/common-10.0.10.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b39f3b3a8f32cdc206c3bbba091c49a15329f972 GIT binary patch literal 46486 zcmV)>K!d*@iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{cy>x9z#s)0XXMCv(^BB;7uphmY-~@9yjz z2O=Q}V~S)0pd3v)-~D&+BtU`^Q;g!A}M zcmMQyz25%bp7^)d>y`iQ?e7l$)ZZHn2ff|hUa$YBUVpGR?EMM!?g5v|lT!xCpL(}$ ztK7NoluqP&C$RYfRhXMXL=|GgtW-nXdl$ z*XR9Cf4|df_kL{6Ax;>?2_ga*nnN6q08S?9e-(f`DVeqaNFeX8MF0SD5*O%~D#+pr z1Gdc2NTb(UXk7ZePOsDNwH{{t)%;(;I7jrJ1i;Gq-|z43?j4lp|3UxYasEHV^8~cp z;9Z8252tSd%}|IZI0RvuOz<=(kk9qj6YyUVn!r3}yzn_fV2tAQx|L=qS!Bt{98S@w z1%QBcE?_JHn<1bIfH1}=VF2@jEdU70Qi@qhmLo8og`|U1TRx~-ZCR@+T)-fokPJ?> zVQ+VTIOwBswANeDM6HXs3oBNh6(yPha}pR z>erZ{DX&;h_X2i9k{g%}pxK08^gF%Ipf~9Ep7r-My$8Miv%SOUU~h2P+Z*=#!~XuW z-a)wA?}y{TV2@LIZx=?peKeRva1tFJ^arpP!QChvKZA#ZCOB+F>Wrjw264P8rFFe} zLL0~p>8#7IhviUt&>41mn!E=CGzkx)gZ+MV2zU4381C;6hPwy7sNd@!^w4hDkI-Z? z8KZ+f97KEl5I!3m3_~;+JnIdfd55^v_D0lA5Tmm+Wt&o0*Q=+lf!vU~y8L=r^}=G% zA5R9m`;as7;j?f!9uJ3m2jkv8I_w?pjt3C!!?3>_A;j5rFh-Le?DzU`+#62%z1_nG zZP!!xD87bEs^}V~5u%7J5ZRQnMa_EJ@-l4&z9D(7DvcmIEWFp*D_FR{J3c( zgJ-+r$=+~qa2TOyhbSB$?xOLqH`$F2_a_t78y+5v_a<->?MLBY_$=DpKY)8)7OpnG z5f{Ta!wK4y(y~@Pm5(IUh6I+-*1>Vey4&dwI|IYK&rr0xci4kHg!XnP2XL}~*q@+i z80}5ML4P>x@5Aw=AMW)LjL`nG-NW%5c(}W^>CMD$O4*bk`upaB*VJ4g zdJE`Hg|Dg61fHwr_By)-`wrp3!Tu0MFd8519>U@N!SG=CtQQ^b?e6st4)^=f;9!4n z7*2-!6EqnQhG@5Uc+i^+QE%^Hf8aGJD$Q?1>NzABM&nKCtg6)$S;K8eVO4xBB$u|m z&Oyf*4+oQj@v}p8*pK$2@$j&BINlw?{$RMjxBu+muzwhZ@L)1H-0L0g_j{A!AsS5J z-tPW*98P+ZF&eIKdo#kO$uzwIVP&-ygjH~x5>^&p3&|nuu+!^2Ge&U#V0aj!XfT9u zaCk7-h2uRGKAVi6!Qlbw?~mbd{49cl-Di7IICzG*8GHzz4F|)+-QnJ(zrN|Fbe+cO z7{&!v5Cbp)=>idgBP1LO(j-9>{0XEJ@oSRDF<(5ZCHFg3+JVB$p@dUmF2~MyW zCtv`0Yr-fJ4weP9eJD2$B6LR z6(NcVia?e|R0^UPhmejye+2{O*_6Nt0m=wuXu1?dU!?@RFv!py-Ul4Xo=Dz0Lm@$s zA+V*S<~D#y1kTbp#>w=37D1-?lEXSzy*Wo-VDFL_C`JrbK@{L6uor?991OtIBqe<6 zV9LK~{Q1-(HVFR0>V84vQcH9A3FHY}KpgX_Cu&*0HvvO)GL-yX9V6~9Jg8-WZ~>2Ng19jl_F_5VjvR@E`gwPY&HPi9-YgUTk=C$TTM}d zq}8N#x&k0AsyWPT1vY^(H8Rgo^%Sxh$SEKH8P}ozg~B`^rWoU(KdPEJK#UUmff&jy|T{$Xc-zq9WJ3GS7r`W3zZj$Au`7aqTqUlIH8M~B&Q6o3P_$%aE;jvTwMIO=B7@Iv886I z8-k-O!bt&8{B%Kz`3rtY3H~RC6ob<=0!KMZX$WIPN=t>mM3@R#e{Ic7mD4mTD)9L; zhd7aXpfWKOKUx~)3MY}6T98bI*5^g+HaRpwVE###`V}XUrD%lNtY)VyfFjq%YXH-N zH^&K{=W_t(X`V0+S(z6q0ZhSM8e%X3{SvetFz0R3 zTozy;P2y#xlz;)r6^a0)8ZX(9`k~cVVMxhUyfy2g1_~6N0G*|I9PuTYv{fVD{3}3O zl9P`ij3TYHOMpd{%IeO*xtJkm`jydQDPJO5bWBnvtO0KQDyy0g5y{aGfD#m@TI-@n zX*zo?Z5E*dsFd14;4%>e$8k;>B4=qVEp6-fPdJHiGOcATGKOJehT?^9%SIeV9rFnI zo3qSIG4PZxfR)IWXg46sO1|N$@2IMeEij^NSp2qiq65a&perC$wEPCx=uVYks`r~C zXH%&PZ#AlCxfl|EhY9~!s`LU)gtFIcO7rnQP{_&>Ddv89Yi36=^P@<^p?c0& z`=`O-B#iS&F%KN43nO33f?BQsC0xq_I#!NHv7L0Ck}J7vGFHFv6aqdgI;*zaikhC8 zS;y>7y%l^dt!VsDRV_;+vyRhCaziR^z{{8%Kvki(WEKU?sy(vE&LwP006}w3Lq!C( z%ncbVcCWpVESr2bVe+VZ!Y@uKR5@M8r*T?0tl@-YrEk~QT!<-uuOOQB#b#okjT z2O~^S$l@h{jKOfGtWT~^)M5@N43P;8#n_(42vRdYLS& z>H7wX^}_;_G!f>yS-Wt`r-*VUnUHG(w^B->j^m826~bH1pKrOPLIyde|s?k zKYsoUI%h~QMTg5N@a4;otta5v6ltm6%a!&UnEi^DXJ}&HYvnJ$x92cxo0Xe*uF!JC z|D#{OsDKu$x>qEfTR2R97+%~Jri~n(2)?|6LqJ*DLNRJXq z76O00iZ#Ttu&*OiTXm*V)b3-+I2R0)D)nImz=Wi8;mOimWbIRk8gHeGSotv8MIlFo zb5Zm{N^oUOO8(@~$A~lX3ggzXNnyxx7=s8h$OY0EfjEVcFw%^jD_}zkC?hzTzJLrW z7{@Tt>uSKVSR0&L?Q@{EhLb*+jNp`Dwgh1esdS(fu0F=m7V~E;_n>GvLs8Bb*t*^^ zuO{_1SK~{{(7c_b5o(773uld9u}jyY+}c|@ejo!?jAP6EG+^QN)ioqhJA%m+ku<06 z0+BlC=o4S;VJ2j!Fu*AiQl<3-WUfq?YGF(eyrRNu0;V~Z)&u0Erun>ZDRP0YK~g?b z^bfrt{B4F3?KVp(dn>iMWhXDwT&yLcgldJFf{)6WdBug=Z^?B437P!gq#Dj^Hz za0v*aX}mxnp>djC zQI5n?pTi<34MT}b(TdRbqJvU5@~Lf;dHE)&!r_zyn?qVnQx$@+Qa+>H~iWfhVG|%*#iTji0Sr#MC3NRKQG-Ii9$1^Sk z^@MzvoTVvygXtWyaJCuN!kt)bkz%C05}ESrUG$OEi8?QGbXD?CB_pJF2fkrb<7m7)Zc|LIxRQ!HI8G>Z6r^2 zxO#;NzzJri#14Rf&kjC+@f-oj08S`_aV&fuotFA#c6;a@w}$vy1w~kd2jp@$QgOOi z*mYWJpV*6mjwFG}QnXYQ602B_12=@Y7$-}B8Jg1$c*&b|N^6JR3@#ABT$*1e+jGg#gS%e*;y6BQQjDL zsAf5OrEMCckf8{C)RYt>u_MuxZOqa*q8g%#`_j_L3%ibUfWUmDOe+Bi#xGC|m**%< zlZcK$zo))th+v^)OYgaaOmk*F4AuJy#Bom0#f%`z5$0ctIE@J68}YiCW`1TjpYMg+ z4fIEL--O*=vfVMi`+ znFs3qlPA*EK1VR205dS-b~2d5Phwj?oq*w=cYDwK!yaE1^16bJIF=yKz!*(Z!fiP* zE2w`))lZ!LUaKW7R_Mg{xl0c*wvd7A84hQ1yBEj8=TN+H7b8DXV1Wg5L@AsivmUr6 zm@$-ebaT>9TxBK_B%F02vOcz9hP!;#AEz*C6GYRTgot*z3AyNZpO^(vyT8rXR|<<$ z&Voi@oFowr`66SMUN`SZv7w)(SU@X^lD(uuO;rLRL;yI2X(Yu;Ia+ds2gISC9 z279oohDW6}4Ar@#7@al2IX4KgaAGQ@Up${o@Fxjg>oz%bm^y@TPjq-d8ZD%DlBFgv zA;6W$0z34ED_-^0Y%HJSc^0Fs*C~v~FosEp$o3B4KYvm`ceFeDu$>d^kOrrK^cyEH2lGY-K4h=p9LG!TAhtl10^o24CcG%tJ6(nD7S62#jg!;G-VXoozTE`Y zdmNromwx94!)<8;F}^oe1$?M1RnUl;w1HYEg|&(y)AFT8Gpx}Lf);C3g9Yb?+Cfsh zRyEY92ZuQXh(w%QD(a+!jY?&?yyg91X_&?x>)Uyr2^iKHqK|xi^l?Z2d(Qv3I6hSd z;QJS+AMNULDaAjjMO6l`69Df|em)UwPP2BVvC zVh)H&-?gwMj)M7?eNkcGtqu)hiT5mhH0JSM~+nrCd$;ly$@C4q$Vy0rKc_9kc{)yFwuQbb_PaTLYZkRW>mU*S(Edc(gU@u@-?F`LqftS!rEsm2II z6MSWVxjLjW%p!v!(qaD`VRITxL6*^8Vl%Zcu?q^=FgcZAmLa~D=kWP&)pXI8iJmQL z%8#nO;xM2YNhjFA;9AVYEgc83?V!VPOmha%r!1u=@=>*plBk_irH3bF+A0~==CdCs z?J=Y{bmOLV+y4?&pWAGug9Erp@(gqCcYGt zRHFV%O2t`Efs`9xpf$7zFSjf%c}P}h__hj1?Zjry>P0GpY*rw}0TlKx|5U7a3d~L+ zn{_}llz`c_=sNGD_gLtPh}+BDq_pyXg1|MKJ0^McFZyqp>t-x$kk~fA`DN&&VUgzKpdhyMua*0 zelGi)g9AP$E*rQR=M~C0g;$u~?^R@=I*|txTdeRtAQ?!<)ttnh!x85}xsrW<{u79h zJi2i!JKn;!YRk(OYEAiOJ-sjFO09b_G_m;&RvK2>n=UmZh#yt7e*Id*WHR9F6`Jtf zHR}z7pl`)tYRdz5r6Zs}7R2TU6Ot9&vWeVs!f9ct`#D%jpj1h#i3D z8C$-GXBcl}LxDp)F&m5lgE<9v?vip|}O*95kYgnaD&g`;zsPA=IDUCQcz z{kWrws$&|wMiJPu(AeGqN$OM;MyLot5*xvMvdmKBpYWkC8?j-?#Z%knZ55An4P~MQf^u;( z37}7y3YH9Gi03=SD60S@^PSH$XH8=5DCt7S9ENCondYP|Kw3DwS1!XaP5z-TSr9IZ zj}Cy39V?3k1T-JFWjI$tH6NOlKvc|7?SmJQ`ss6y zd@5y-z&T=w=v5eJMJH9(4j+j$L&?jZ&h@z`ZsqZRE46=8Vd4$6*EuH?G()uBdv@pepGbcENwoe!QtTs`AjtTrPgNosMUNdJ zSVO4u8qs1W6aQ0+jky2^RBzM}6jMXxA_PxBUrvzkf;AS9#OajYkT({Pbb0kh?s#DC zkg^)hvs7Geq-e8pqM_@F@Y#XhIoExadMvPdt9{B^F^?P9wJ zJSiO5Bl8Mq-<))*>C%I8DU$%9ko*KT=+iOi&OP6)GT0u8xO zpweQgVG{M_hqtO*MZT~{{;lUf;dCim0d% zQ6_9t5NU4vk}ZNd!sFoJz$@+4aLIk*>S&4gMck9fGni9E%nlha(L?iPdrHzg>&};L zQ^d=l$%HoG&SXLxvSu=&x93Zl{j0dZpfBzdUQd17g5w=Ccl{M-!D%{2{O{nA&sT`D zH5)qCrA__~M0kNCk$(}>D}4)!$bdu{OhVLYNgT!2kWM2?RSruLhau8Y z+71T(R=l*gI09#nBM{%^zJyp|KY0S)5g<0jK#VD~u6f{V^gOGyV!bw-Ol*eE<=-2$ zKlmBTU(OC*I72XNt9NY?xT>iBmP-)1zr+b1rU_*PVvzuUBZEh#bHvHCjTSPrqzfs< z(?p~_O40~*pCsa%h%+%u3n!VYdgDZTO;FRVwP6yqVZv}* zzu9i-zdT5?G)v=jx;)P~QyMz!c+Cz!fwwjg)dl^R?Vjj3GrPm`hpsC}9N4w_U`-u8h&-)XFk0IZsY? zaIY*>qzk=+B#tnO+6sX-O9c-i7PbWrZ7%V|pKT~H?{2rOewcB^nU#{c-|6>yQVJMM zr6g;EK!<6D={(TyuCK2<&U-f#q)t_!H)Sd4%B!zvO@h8o%VakgwZIeb8v;4a#Wg#Ap z6NU)*v7qsf;xRf3w3E3*LgCjzKo*aR@?#+81w$O#RZfq^`i_|FV=Gs(IXEq|f9iZnGICk_ld}X+9H9_e7m!(gUa>}V9K31?$a^KP zJ)Fo(5>14lz*sFZ7mi!bT=Dk}BkTkbgHjkVN*0CJuzIB&sKf#n7m`E*^J>htT0ILE zADc-mmvyrAD;%4%IMp3~@1EX`wndzMy+xMr|L<@V)Yl{xt68V*JKtT{e1D;`!@%hk zv^>f|30{wSu&?fyVp-^G85$@f>%Tp;&A0oG7|`GjUvxD_>5DPaf78GBeD@^G&G=4}*(ieC#Tr(%d4-mM!7D^LABEhA)5(Rb)@5sD9A4^hb>%=-Gm^jY_eN$= zmsUOcl!>cqu=Y4-@%I+v@$w#Zy#wPO`{^5kA} z*a*M`O-A5ubJ#cy*guM#Heh$Z-#d_eU?pg&@Ihh{ifq6L#gc!1mfnH#Cb3&>I;=ruGAxL>7sC22o+BIJY5k z4tsz0ns@tkdWFRY&K+(9(uGM0A(&@sj(tiKK-F?#t6s#ZKGkP3J}4`PSLpt^!wYzq z?5g9|EjYc+CPso7ou%>^rJfih%{dQ<*NM5TO5EvmjoC~X9j9q@XOlzYuxfG`Jnv&6 zVSwM|>@YxYG&@Y~dv-HCdD2pOz-h6`DAS;eGj!Z6lWlSoCc;^rFrAVqLK#Z9(S{M_ zpwz7_DP>#({T>$umX%vtY7VWNx||y-0#BbFH1=0C4hf2ApqV~&@3ay*$6x{wq)R34 z1!E;CL+UK``?J^Q>OyKuC-5 zs@SY!s_+AMElsBBjk+c)Htd=#{7_x{)8pfRq`K>x%cQzui>!NDy*RkTviN3g^m@JC z{@$MWx7X{H|Lq;@_W#u18w>}%-Q8ZV|EJ!d*BkEt3H0u|v%V*%43adK|rtABYPV3Lz zFJD@pKbsh|fQ22&fgQ00+o`f$0NSb!o&eDKAnl-OoQ`4K!Jm%#ic4Q3s0tF8Oc8jB zlL&p<0Z*|&boAU*#-CnRnsIKT1{_km-EP4Qt3}rc1XqW&6DGJ5CgFrH8W;Vbb%m2? z1k^s%k+{8^8zwJI{@d0ZF(@Okbf7c-)c*V#JT2cvEM5wndF%SN5|u_s++M7D^5x5q zqMIm*bdO7aa*8z^|GN3ljb0eve9qg?n)$zXaB$$x|Nd~ecknp>AL3ax86^)m6R?;< zzKLfQkacT6bd-gl3p`aRYxSn{=()(Ftt*);EN~)rer;T1JnrNS$GT8QfeJupy9{3V z!xZdNlO4ItYt{lUTC}qj;gEqqE-`{K;O%Wgz^6Ew65hU?=7yL$ZSWOZ(#qREq=(#s zBDN7n&q44sNh5TLv!Ljw>fqkquGM$xcobEHug@wE*-X6e7VlKUB~W@CWgouqg`WM! z9#Fn?a^&!obYw)@7wtsTOu=7YWO4C*lKUF6(6;yo)WURr`enNun#w}+Q8Q0fmRvcVXK8xHA*xHWgGE08!LdG56WHwrMU9~77fKje zW+^u`c*m~MSom#FwQE*MLoK`db8opaA*%vO^;$>>3$i^Kp0BE-8&NFjp^rUhwv-5{ z7VC&Sdv=euZ7wMxbOSgm*b7ep`d!V1@=UP4mjtJ{-!9PG4S|ELLerMN9kYQ^MrVB^ z_9n;rhBAL6zGh^3EhvLuE-p?>5}**HN{R-a$?HlN2Qhoxs?w9i)a_2GF&eBKJUx0a ziNIEwOT}<*gDvmaT1-)rx*i};E25xgG6`vC(LjkrA7Js#1DKoNj{UvpD{I@x6_0H# zfws)Hjlcl-bh`K+fDZTrBzz7f4D9iSHN0ZGj;jYV9->on$H%CRKfv#K%G99CO+itI z54HPEc&f!W-fQQZ^i+Jdgz^uIQMdcUV)Vn}hecqaARCq7C7^8^)as={d6iIO|A&aM z?j`@P^w`{LA+W~&AM_7)OZNZ4;9&4*|3AdD%KqoW-;uEbauFbPwUrNAn6j0*B~KPi z@;K&y@j2GEMa4VeGEh>0xA99FM~H|*Ml8-C{S__i3kP=o#6ZJSoxig>I`hS5_ zsIHNY-3B+3_@|)0xXC#UwynhZbHXRZFfh2LL4 zYxMu_V1K`)|Mz$MyN~++As*rXKSPXQv_K+cttT?jo+Q~g6yxGWFtzq#VF2S!SB5&W4t1JiIQEN$@35f=m&cANu^DX>xv z6*OK)yCSajhQzb<-8V@Pi8>La^-LGwL?$4b75Azb`-p-uq$tu6z48_a zB|TP2QqfkYU^wsYv*b~$l-YgMev0m&!I8Muv2tplh=x^Br$tu$;*>oQ7%GQHQN!=< zDx=&n732z^tCIhQ^VoH8SzsOKm9ZGC&Q|dYM5Aq+P8EQTs#8QcQRp*sxsExSqfZ)$ z)Wi+})N!GPy)S{)?!Thr3Y^DfXSqXqD>`9~tg2TefG)zv-9c0(HtoX)li_gXSSskN z2hzSRD3C2&p(1=hv2dXMSAof=6o8=3UoSKMTApbRK(MfIQy6ToqFPj)3_7mDqSVT1 zrUM|{>1M`IeEd+DJ?r4q5Ud2LaXUb zMW{CyEa$S_jL$z=*>u=0apxk`(Ld|?TL$=89|W51YHZ8pP7#jd(n&?UwB1c)L)0y` zZ_i7qK$70J#i5F0WnT^@M-ySZDdad>O4M$lw%w`4UK&r+FNorZEoXu2x;0%oG!W*VXfa&RIeA z^JkLg8UKxv#mJ62SEtKX>lt0hR`W24Ol_gfieK`iw6%YW8PY+u7`^ z#wkr8jzMrL_A*T>I1ad595c7lWB5)6)`lplzeEbDl{6^@@L%nKrwi#ntMvWK)8WPX zFc@{NUqf=v+Z#ST)ge4LH56p9k8|E%=JF^yR}Y$(6z2~F1~px3gP`3O#sL5GR;UK5 zrCI<*0uJzp$(vvW42yB~nPgU;TPvxD+V^Gz&qdIe{Yk}Z=|$i`j(lk-@dTt~1-?_v ziUnNLax!B^)6#0i>~N)7(FwM+li`vyW!(;?v#v~#Ay!6>C&GykKzqqau&bzu?oz{-d{x0bFDM^#>LEueUqwJ=%W{@fiD0=a>ww#E^2_ zsj>cK*2T@NzluAs{QzRzb9}E+e3x%`zZ%W>n11JF1g`BDFT-KUZKSJxHam;CSVRptM|&R-47@A}nWeU4xKZH?R4E!M>8>(+2x zz8m{|0SI9R$2i6eBPAVS6cxF8-@d%KJbLlw6p8tH1r!M}_ z&T{#{!GF5xRiS^DY*-ce=gEP2w^4sSO?S^Re+79~M*KB2#_Q(4&ig9tKY8Enz1e?z z!$Eoe@9jO>e-H8)`_Im$Ji*h=eZCq%$1u#Q32aJRd4p-A`yxmDjIr!879pRPGA+cj-l0y~JtbM_ew1H?#f#MiTl|^e7|E`7 z**xo-@5QY|b+(8>F;1_rwu-_Sqr{{^)>$Vy-b_RQ(2&3kDH&k-xV@X$R(n&E&ZG_g zk&Z9TSUKh>5O=EK(1p+I$Y4PyS$bPsq7lzhTBMk_UGMVwM>_Vk!=KB`46@nfrCM>Q z93_D_hs(c>7o(BD;sbry$S9CqB)}y#B0bQKV_N z^;*At%(H;x^tE`s@nO%hi{egBeVVQ;?(3*$N#)=BfzOQ=uaRbCU`>$7?|NZ^J z@X`PCAWxnB_u=&IS1|n+S>jlIyiA0t(vu|{P;lomL#~2Gzk?vnP$EFBu2Jj!m&g=Q zfZsYX?OkJnra2^Qaa_})4ad`FC55Zk+*o9ZHZ(lQ6qnjt2~z)k+})2)=~*TJ)dc8X zO76V3_5YwZEZcvB!K3~6AWxnA*T;e6&;zXmpvhWNT2IHAGLTNZ>*^LvB2g21P8V?* zDxJ?0+-P&bh-LqhKh@`$?rFuZnt#9rzv=MC>wS9r#7?@q^sbXRJ?ffo;%OxR?>Ya+ z!Tv!x|3`oKG5_C#JeBjGcd-5I5s}62ulnfQ{8gXU?EN~Wnr!_#6>gX8V}rnN{pS3? z&oAG+d-4AD%MEsoIrYBJ4P(wicePinsBr(=#5J1?y!|U2$LH6Wg)_IcS0`sLe>-~p z+HNg)_cpMKoV|O0@$$0ol;|G}I{p1luhZ-H2SE$C_vFd@N+mICnBtR+$5S_s(#w<6 z#h#0qZ1(eKVR5MoMF&2*)C{>95y)lPE1`2^;_rKizh9z$|0dM0=hBo|cYImsX|bDAL=t&#-^y|sr1Ux^ zk)#Yt7OzM;m$3@cf;&SKE!j5q$!alg;a?4jumT_KP@Te?(V;U)P}DI6H6_(;{o?Bi zX0^N>&M+AtNhSV*+dH~ulVAs4HpUB-AWBb3Iu;E%FPg?XwAZw9KhYG8?7#cX|IynY zRQCV(29NiDKge@G`9I35#`aAUax@S(Pi=9tL1g#Sy2$Pir*AKh-e3GuxsFdLmnMR@ znb0+NC4J4+@T&Q5+|jr60Ir??2bKNb;qGJphX;A;{C~gcvA+`!pb{Bt<%YEZ;`iJ}j<0X~9z1+jw;P}7x}))LIR9_u0b1+-=~wQ5*xP-~|Meh`(f`HF zx&sf8cj^>AAoJPh1u`Gk_<>60ns|arRW|Vj4fhXA-XQtr*8ZSkQF8wB^yuv9;@z3! zG5Am0rEqe3arD#cm*F4az6zWjg3uiw9T`Qq)%i{IXz{d#_Ra{6Jf!cJBA zCEEY%`>Yz$Zofpk##C9)%-@9{2eHtyU#_RUe;bd^W>3Zb6L&jwFMml1{wLSn@o5?z z9Ac*cQUJj?&XJH*Li^4PQ-Cau05og? zQgO=%1#AWxfCPb%AjnYE$|+8!YQe}k4a9g%AX%<7BIW%evkcl7hCG#L!Z*5izNpOK zZhU3EsyoY|u3EsczFQYP>bqYuSPB!=_u2a|M6u8CJ2!r6K-Lv9sl_nO!3w znz~I&UT%5vnxeG}!Ezkwx{OslfP2&-m0{#Dj`O2Xj6Jp!t?m_{dafV|pl)o)a`Q$uaI`=KPLb7!hg$2f`0S>= z@b=^lnx|xWmz|jlh&Sm^16-Qf33dAa_E~?5XPy4GZ4lm2hr8z&Z>`Cz$05G~eeTkxs@2`^H`DD+vpAI+Ghk&B zgE=BoR9u-YwYQ~@A{?@9uQT7?@6%rY?QO?Skn62123y6dYrDEZSW*+U$iXB@nUKoO zFtp11(X3@B-=p7vYTciK`{k{EO zS^xJR^FKYzv$6g^QFq1Oi}p8Hir$g#SMWB}{PuOYx7PdRyLG<-t#4DMs`Kry4K%)m z;M0uYIV8(-b;a-KIha~I;QHoYuad^&PR?*#+*T(+l{Va;!kneAadLH!O(=b>T3E$8 z;C^K25HGN4kCuI&7;vGYLvf_sF_+@5`CbO~+}iuXpV~igZm0vYU9n<~ zQox^3^ae*!jIJS(;ydu8Cey6EDp$}#wiN$e0xYJ!0#s?!k?6cd8SZVp_8|J)+56i8 zVmkkqn9-H8W!hD+3$F4pA_-!Mh9n9Kr(t=2y&*aVmD@I4tdZRHQfV0Hbt70FmbrIC z<{J*iyxBO+R}I1Z7SykAzn1VDG*_j0NuYX$Ur5Wj^TJ51b@cLcY!#NF1s|1FlW0YQ z)YsT{rN3q0gFk}UD+r5fN)$?`g)(<*To$&de|U#Qb%WUFrl>d%0!AR3;49Phg0DI_ z?UFQS;yPwVmRX7uMgzwIU3{>w1HMLM5kRFQahf(`jks#Y=7CDY(8Ks!ZscIm`$l#w zmC?wn^PS|5yCPQ8ip7xvsRkpk?V2Yi$W27(A2B31&SxI!-|0}Iv0w$)CR0aY56e7X`e`8NO zXGjE}bj_ z1rj*_>;qfD41h5VuTT<=oR{m7kk=Ssd%IFUh33V4^OE2&`|L^{wbpK!fV0Zs9|L=o5 z!vFh|XZJ`4zyt5?STulMjOzRCpPJM;58+`6H+*Qt9qKHnh$61dl*f^PXt`5aAV9~ExT2;~bRu@>`*FLabretY! zj$#zDl#HrN2ZOL%43t8vy$YnpZU+?5y<<_4 zIcCK#cd$fB`L};DVwdByr*d5sOMxSes1U>xXmNpbWM|{bhhj~Dv!CKLysG`s32{W+ zuL9z8aWO`*SW?9cQ+3lcDA<7)vQoivmnO9V5I~Q$OpeXA{97>lA83Z zk+F^Wia03%t%2eZVEuswyGr_X=-Gs*;Ankpil_~5b8K(GI<~NH#57igD!WuZx{Ols z3?T#U z*|1-0HZ)XRI`+bLvien*Q?e}#uZs5KFCX>SqyBo-UyY^DqyBo-U*EI-dPw#4`KzRW zs`LM5i||fjfB)1V|4aX%eEw&++j~6!`ykK8@xQ0~R6mpV{v5{;&+jK1I9r6pZ6F@c zt$po9yGQ`B+G$(kvMs{`weDJX&N|cgX|@PAc46O*gI7V}ifzks7C9w@c2Ek0)c97t z!1~L|Cd+gvdShbdQsV3hms<4~E1(rVWiQ*6&l&kW$+|h4PAM^M6T~1+fX``L?{u}g zsOl@S1~U}TJ9O67XFl6%t78PN5XxE}RsL}PH-Z^@mxL$~Ng1t;dnYFc5SJYxDQDau+lR0!W8)hGg`1QlomD^`OS6S>2o8bZ65JsKhv4q+ zF2Nx<1lhQ|y9IZ53Blb01b265BYQ6A{%`X*-96LYRkglVMbQ6X*r8UjT|_>AFLB}v z{c@OL?s6K(dn+-!PNu)8q7FHCpz58*MlO1oBhI4zb8acO;{6I`M`sGKOg?3=1? z1RT8fgKn$dgUD5))brk;py3xXvc2VhKq<>(Ctg^dufYJxKj+2csDs69w}S2J^Y*#@ z@J)XS%Y-7E`Q=g#hqM#Rg%nby@i0r9<{dL>OEEnB|6n9f`K#L}yVt*`ATRV2=o{b) zsN4gVeY=2Tk=&U3-l+^HB?Nz{9_OWLL2S<~lHQxyKQZnvx_Q;G;YLp5(;|JPv(8@CjN6w71FuT3g257ea>NI$?_R$gQy_K$CZZOKfYT=W>XjU(%#P4iR#wxg= zq)r4*AN=@}Dt4_XshS#UeTF{8h2+=X#`BHa@>+{*a4CqKMzDY*`?F#*ff+$HuMNwW z*=$vZS2yHedB&(om{>uuWT`x)9yf5en#y4c9c;1lr!Dfp=FlX4jIZSjC>ti+S0zvL{hHGzDn`Ze-&lNTRkrEkGPKt$VOn7 z`T!q7_;=O=Jt`|P(#c)W3vo@&OCw7?^npZy zhNn+ngRa~4an%=B6E?-msylzbv?JlF-@VcBz{!7UPxBstdlHxG9c}7Gyhtj zofl;Wtv`LHt;0whHFV4hDt3;h_q5M|?xP|*`bU7YH&l|9ldsm*)cCyWVZ&QZP<-i! zlQ6C?+z}E?j~PC)pBZ=9Y{VL?R4t(P{D!1YoY&%$FfI{McuQ(NuA|h2navf6y!c_8 z!M7z?=A15~)tV|%q;85(>X(bzQCcWxJkopDzfzyNl zS@KI+s|#$+GH`l{F$U=k+BSP#>K7ma18X@i-Vtyv;EUDp55KYufqjI}YYT>^@CU68 zrP>~}_}!B!#ulx)=y>I`mmaR*w58yNRYy-jW3kJbrTJ1^FxjpXceco%jx^0_hhnJ3 zQJ~LI0&@ADko%b~rC$ePDsGxwnWIH9mR3D&2-Cm=tvbx#3`HfH++>TmA@hF!0ftym zT4FN?%Sj#Xi|-pfRe5(nDeWh-yH{gk-3SCSoHn}I2Da)3ib{PN%T{$ltxR{oC+VyS^| zMBNcsNHyEv7!i)!-`A{gEuOSbO91)B5nPoBDCVB&(fPaGfIJ@anE;HRap3noCgCG* z?7Z!jt)S%CD-0978JwzhwFKR9Rp!Ws&xsa1haQ=gmiXbn8gtI|Svo5d3up#=y|n#V z0#ja1QDjsG?p8#oo zr2x~_g?LS=?eMqh%6NQAgd9y@dIYM`SWCJtcB%sTme#d&x~G!ccnh|v^d`6DV0=fg4%eik0}EnIGC5Nu+ej1Uv4H)M>8@+M_VgQ-9&FV zlX<)i*#i9|kA#YMmn%kAHlEJ-=_jcNuU{#Zg_)eQIo08snGl++xpU7F_9lB)-k7}7 z)HJ3rqh`K$1TNxoOR3$($eT;>wNVx#H@ETfw%Na7+{y%agvCMf5WNQM{J``MU{1d<5xxgOT z3HsqA7`k|^e>MA=rnQ4R+2-r$F_s>Z=mU(+UtFY!wV<{3J7g2E50BAn4h0E1e^sWP zF0?Gw;KK~sb8*9cH~qHa&=s%^wH#Y1HXiYXng+t2g0Ln#=sYfaxy!Uuj2UQF%5cuf7 z#r{u!<|sBr!pB-Ft+*@blz*2$`24C7MB7Bk9iH<=AGEW&lCoX{o89K!fJ@4CeSGj~ zKGfgl8*OSMJ*9Q1bQj#`y|sdN3ENo?6RLOb1940TSj8{6EU6j8zY4#wj*Z?Dhy*wA z7)+_uJ6^Pf7^(|`+$k$hp~X0qK1SMXMb;i#nbjqWgwl91LA{XYRl*4VbHDyD@a5m! z#}oT8C^!`SU8LmIwdVi_L^pgem236bff$i=%c~IiQ8M=rZfxrVSj!sBz#c6FZ3zLxL`|suP@)V`FSjj$hm!roM^v5c{U5bk zw#-U=`O9W(X-?SP6IX)sP*n%*=AH6r9PbSK`H1-+x7+bqUd57mX8bk{&jao0?yv+7 zQwxXZw(@HMMbrwzlThA!=6A*OpTobQZvRL6yhQ(FOt@bjGF<|4Y7fZ6;VkrGE>d4L zD)vUPe6wh}WStJ=J@$Qoo3s7dsBsTRBj9m=xznTg8vR+M(%EyrG38^o6<6?=XYieG zb3`kdqG2|%!TZDtfsgOU$MIN&vWa^ISeqNAozyw@^;foqy`0={w)dC!uV;^Em1t{~ zSQHuJjfuT~aQ$F`lrGO0yehecS9E;US+g(NpAUH%oa^T?3Ggl|JKLu`dL;gc697ex zB0pz7#n}ggjXGQ}=!I!ECd>!zlCEL^D?DCVJum9IR$?=vbLOELr8hEdQnIbfGS+~o zgBuT~hw03smOWO}ClL}qr@9XCm6&UXU+KD~O0HYol8|M1s1rc1!RjEr(e>=9%pJq| z)How{aL&#VCv$kA;$6nn+CCUp%2>}xljQj5y>QGujlmhC+~7HxvA_paXw;s{U?h7q zmuNf5iij3vxxSO@kW8M86EMAoJJqnIesMX28sgc2gXT^hE+gyjXoyf5P63e|-AU=- zsop_A|6t0BLjPCO3r=H21-xc#q5YL+k*ABjwS_)gc$i}ymB?fx1IA`cfZ$@m9Ki?v zz3#=$=8{>rx!7!)rn5eiX%X&HvW^#^#WW|O;)N56C1B)4F+?<`1(kRVY!-Q$_N(2l zLafk_@X!{}4hjFt@JafuDM&6}yyC+_~nhj=(FRcjPTFN+y~D&e06 z_pab=sO%~ly{vW&z?3o575;gZ0>>a2n_J2MX+W~F&85K9r44L(w)%-lcsgLh*sQyv zkb;5lQ7zr%r!GUWrinu0XMv6YU_G}PvdI+VKm^k?1gsLFGamLnzis~l9zT;F1NH_J zm?Lx29WGz`tsDLTtJa)uP?px}-uM$wmKF`#pR2|$Bh^_deWVx8Ru|rm7u-X*%RMJ` zD>^h&nSXw>%c8ijjoVTej{RKBXH|dWtOmkEv!oj{6PGV>e;F*9`A%=)XwfCeYVu}x z(YBY;lu`*e_=j0oNPb}UaX$##ee#HGbJtTaV&Y-AU15}`dqHblW^FJZWvVRSnshS_ zc@vM|3tW=<>Qz+pEWuVOKX(Y0#iH7lxADDQJiV-Kp)M=%J$A_BtylZL+w|CQq;X|In=Wc6J=ETKMN}FwQZy|;+bq#-e1@D1x2GA28e^^ zR*4t#ByvuoO4wt@#QZFBp>(Ilw|$VJjZflQ+JL#QDx4eSHCt zW$Mo3CQ~6xM_W{j=}NO0F8-+p_Z3Hh)9^3xAbv%5`QkLc{%0EN;HhfyxQ9!AI|N-` z_xnu`q}*a1!qWMDFGAeL49gST*x`B2Y=0ThOmyRsqhVc;tukm-IP8oJBGTmR zEBDqO$z##jmoX?<6_=5!)(Rs$X)_Xkw|T7Vim!K3aMTc`jfz`bO!n^BF;Lv=qeU)M zPsih!hI8_aN;sLNqSmZ9MgPZ6{Tst|_!(|50M)B%VpV_v=10mR_i@HsL}RtjYNnzC z_Q|wE&sm51a6S$dD^p8!NJ%>&SW;@BkA_~yjCfJtfiM1322Kp?2dECcqFn($2#r({y{(Qd-n zCB?UFh5PUa@l3tY5{gf=k##y)^;Qf{wl6ph8PR-fM0eD)6?frBDf2KCIBKDZnC((m z;`niN4turFG6`a78i=l~ds#wIa?>Gq`$KzOK5+Gg{jvt{I;xBNuqCE@D3{dl@Uc_d z$Yw{w1d1~eJd`5Jsj3sIeoix~C=57+Jx>cIC*n~L#ZUbq9$pY%V1+mWH`f&-S3zi8o(}D| z0@G^uZWc9b)du3>dpQRJE-2(WGXF3#$ZIWbjkQJpMDF_cwPEiltnrTTIJD7=khd)I zG2a)#)8*azgAh(a!qDy+RMRa%ilLMR8g5RcH?gOp3Y68vhZwR zYQ$C)4a~>?SS34>&r_MD=g(q2Vmi}<@Nq?DpU>s#n7uSy-_YeLT#yX?0U<1GD^3W< zPFz~{X@(uer*6{Ajzl^KF;bB10nzsJ;_UW*r&e{Q|4@TM{m-3dTZb*E->9=A{L5?5 zSb5fh?m`uK@cyz98jSxC7d11nqnHwYRJxWS|GpfbeyA2iTLc|HrRw}%tODFI+$+JG zh=}iEhcM3~Kq z6d`xcr!8OSDoP*3*8jBj)-QHgj^+I}v%rW#aWv>^Y3)|bDGj`Nt}#50vN;`(NTI=& z*kI722Uc}<#++L5S{sxHZ*^^^927w4Ft%?CuqlxYGs;()F5!lp1P95*x6Yw7e^)HqKk^zo?$BLWdct0{2t$n8S9x{4D z-(P~B(Za_g|NCu_6Vs-g`T6&sGXb<(%|}yenVc`J*^9Z0sA$1SdTzhHe&Vw5H=creh{+VKNfdhVJ<3q38C6rO*1-j!}dw zJfFl)&a(GZ1ha>1^^$Un?`1I2^x^ne6@wTEI5(iP_*Z^StP}6*fTSY~G*B*Q2`8+7 zwniv5b(HzU)N3DXl4H!wct3rr#>PjFR{6#ICk&IQWu=T_)-L`IIONknkJH}$ST4CG zPHW^j6=(kHzF$;lkeH@W?m{j1j6_^+`sJQ=8E|+mo@+(kGlfil{pH& zA~caLO`|pNdDX|KXi$wd42HExZn~fEkRuEjkU-5jh|V znvDHm$2Hx+t=d7Zv280Nr?d)0^8fH7YBwUHEr88_sU>vUn0YSjXzWbPBvZQ7U<7cTLdw$2OBG#eN~_{n z5dI&RK9J+^T>Y_ZSJ#iLj5qR!;Wgf;0(Jy_ayf)%56Y!x;cKB;TY=$})l}b@^gliB z14;&qX_lkE%Q4JUa1>Y5ut%u{fT7Nt`l2WVf@&#k|gy9tvC* z)vG$^gevr@xQI~wcyeq(C|>p&sA+UC+2M8z zgiaEEVea=gE(X6FkJR#3x*V{&iM10(GmYe~#~q#;)TD=45qo?l9b=~yV+~(j!Q-7S zwEI`^jxFgVaE6S+jjo2HlR%S&=XW}Zf^v#|wVGvKDK|V!)&VlDAxBA8Q)R}UWOL?ai zqMyq~OeB6N_w0@Oi&s&Y|1byfT<7Yp@!N_K%*<4k$CS3u2jS2p`X?jUYaz%ki@z#@ zjv_EG9HT017R=5zb6LnC(zA-DNaLvHE{iGgp|Z1c{wu(p005Y@k=#qrr>~%X5s7!z zKIz+g)x~qKcPc^#8V-&|g%44eJ)D`Ynv8A!;PV1r?|}|gI+8@X%DEu+p}#{u5v1Va zmhMkZiN5lUM1@lu(~1z&*y8{^axhzZmQ|{Ir-r_uAWW3sDY8o+Mbb?3L3rQ0ml}0s zSIZ)@QAKAH&y~f>-H6$2y;U|=({F2*xUrIBjobj^Sqx!vCnTR%0eG%_;pzL**(V&; z3YgtHIhL5Ur3R^$UUL)WfpL22>Ap|Ook0@y=(Uc@Y!#GHt6Las8=FzeNKDElZ#2J& zE%pMm9n`BjxcX-UcAJ(kwc(|hZF2Uy;6H%Hv3Yej4qVvIz%skcd*{^%OmsnsGn3f* zoArg9Mha5B2UMC(Y$_VP!@nFJ!v>GS20?FiR+XBPot@pj^{0lpW+$7EI9Oha3ZKsv zmojx($%D+Kv1WFSjx7{-sES>`G6Af`*8(v!F1TTkEp3z_R=E$m4OPJ%n3gc}KQmge z9Y`i7``#!C!>FZqaNoXZ#$qd)VPLGGrFiPun<#6aC}gP$a2loRd93j;TK?VmA=aZ58AK5o_wVtSQYw zNO}m3S#Uj@B0`<_`a~JJ*3wfrvWe;|NN@1>QchpT)4p!%Su>C3R47C07V`cn$i7PT zK6(N`zrf@xC=vEz3OF?Xeh&uJq4NMGKiz#m?X_bCu*7?R@_u|c^mvy5j<#@J1Lc}V z#0JD~uC9tU;)GF!FPD-Xau+vw0Pybrk9aS}2I|XqO z@}D{^E9NxT^dW85HS;;H=d>PqEcx1h=++^#@p1QH)r2(byL&uyXamQ#z7A(l`iH>k zxyCCf=uPTBjbqF!XmC)`;{c{=4Y&E4q1GSMzXEYK@Y0FmlabaFR+MO^LBzgu2=_I= z^KW`7y{*YGLZn`zk&?7@Y`9<4R=tRZ?`EfjzBl_QR?`DJVrb`StbjFm?l%aTTldQM zWwvL@k`fFOL);<+_ihUPV;luUKu`Fe}3A7kK8y+5POFHlE$#p2^XxdvLk z6U+vselj=&)Q~trN+A01i}O!}O9p5ixK{f^+)$_eFGH~+VqYB-Iv}+Vs5R%M4)+Kb zeK0NEkfsgv_f+K+vTO5t-A|H}>eZ2#Ma4N;?F@u#d$S7^4?EfW=ikG%Gil9=Z7DEs z4gw(x8DSGA`D)w(O?`!@fpO`-k0?6&e)<9BJZ78QKw_;VrlYyP1G-y9%#AS= zjnJFp1VT+(`SBRLBwIIpwhHuu+K?k~6doVTK-CTv1{@CS)HDs!p%JHLm{D+-bL zeCZXZdD7cBu1^u&+=ee9-Q0_GYmz*M234ks!0Rh4a!Z%P6Eu{VP7LlKv})Kbk#x}g zErv|wKu+Lu!MEu{@Vyq>&$uR{>wjX{CCW*6IQj!C(}ks_DRO*!`$s!&1laxkr$uRS zp6%_L!dIWR7cz5US_cYami7BNx=!ub@$-DR;IS8FQ~ucsWuX4S?cIzlTB2LuE0+M} z6WFKscPbbOy4YP}{1&#$QsRsYx^Wvj!ppBna&G#$FumwwUbN|_kE5o(&j|i=jHJy$ z$f;kc{}m(qD-D&pi_-*zL~YI10UMjphn+ktc!2KRhBF_7BV@CY^Ho(RPxbQa=9O+a zj&HtK@rk=jiAuui4lfDyyfc*KVASg>GKucTjcPIF;%1?7mZ4mGmuB2{>zW5py%0CN ztV&Aj!x$IDuZbS5fp}bO@~;Ppa=CtvR`&*#YiZ1C0ob}Gyq}7ody_?(kTS9Xi)PsC zmzs)6EB-EW$I5Dk`G)g7V?U* zx-n|MU@{Ve#m$>v5O@3bp-mQ1`e#)J)=yiQK6Gu`>wUt$-fpq*Smv+V^n2_8EBdRT zbT3SGzVuWsyM24qKP9ouuexZ7^{$>&wEd^|*j`O4kA*dIA%!sux7S_qc?Es5G~})o zAUp$+#&~P30#TnHdlhIUA+7xPmXKd>?`nSj7o*K<*BIeMc39~FTi8+Z6U|0_(N_@c zmAd{Z+ZL#YCK&y0b#IAMR?;u$6_P`7d+RfAr z_jFxbn0#lh&Xl54DAh`#a&Ju-sBoY?)u%pmS!jj@QKPBal$o;Hr(CCt^P|ph>vZY! zUrM}j&Wr+-ecs71xzI3%zi_9lI+6~<{i6)8IK*WlVWd?&ky{90QoLkUhzswWi6jb5 z5PoEc@xVHG(kx(o6F`QGojZt z9`se9-gIMR)XcOJmJlXhDE;9ULc1}l*vQj|@F&$D19{Jl!>{jK0^bM#+ADz`p^Fy# zt`@~P*EF!tpvv6jY@`5<(_AIGBA@)@LdF!ckcxueDX$^XsiSkq!K8fxh70i-{^=PaqfgHq-yuOB2*CDx0cGdJ7M= z2LrW3SXEM)PuYcEKloMERx)r#;hfb1YBA&q&SJ>dG4mxD%LT4S{mBhY9b#_SR(4fE z&iXQFPlH9AaUa=+{Z%!@Te&5s47J@x#2dF% z)dns_ax2hiv{ABLN3V$PsRysX6xLf0XK#Lr)AcrXxq$tRXKV#?5T2(HmW$S2Y67Q| z+lHv+@pIdo->W_*WMmw8{KotQ3Y{Y&&Q~e}vLK-8>!Axu02Dqv1nd`iU_smDa7YI* zUXS{TeP2)~&}!iKa|i;q}8iHnL*b_X`daFn@sxUz-bJ$}UW!XUL6$UC*32Bri3 z?REumw;rxRwW`2yjy&0$5XQ~fHsCzx9S%*GHtuIl-fPEI0G*1=5xB3800{L6m_U zf=;AUm*4Y9gBIFhKYcc_caQ`$OlWG6Fmd{Epe4wOOpC#Q%T?N0UJyVC#rdOl3xPy4 z(%l`K#b#oR!~vVCD}+Vx$sckdDuxN6W4HiY?*Pd~UAgD)m8genpxz5;<c-`KM!b`)P1=qq9IzcQ3w#FBxwd+ zk7OwCr{1q_3J@We;aw@n`(8y0Aq%6Mgu?mK>R=Nd zB7aGg{3`EM0vafn)3?WsD!6V?G&GMcF5)pnE0Qt!t}{!e>Zs0_QnP{A95$wq8>@bi zN;d$~-h6H>%bBYK98Cy!J>4FWwtS!SzCOsmIX-9uZzj3uFMw1%DU^OZbBYWjeFQ~r z7mSuSmtRk&d6I3LjWpn;fVAE?YzuvILaGFCxCjXb;#ALsIXV#s_OZPk3iSiG`@?o< z-J^G|zn912ENhJnx_&w#8{+xGelDaC+CQ%Ch52?YZU|3t@ya6r^FgV_yp1|&0A~x; zoP+wBVI=_P%MF1VGBh>R1}3rQFgt8|sb&e)8Ujude*P0eDb+@PdMr8wBQ_1Lie91N z-P9o-ZrLip8kIX8ZK{56lx{M1Y0q7H^g7kW0eSZaT|Fv6YQaNsuKTU`*W%&BzFb`h ztNG#e^s@%1M?B2?qzmO{+zXK`c}=_{abdThwqkQwdURu)^EPrGq0U$E!tH5ZZ@cIH z*7yIYwdWH>z)#${Sdrm|LU!n{ATa>Cx z+!ITBnam%08;pCYOYjfR7){tkLov$5eT02%O?OYHq)<25&<4^-I*3dpjxyo|!7-6O zBlhd8)nT=It*8FeN48#A9Hv$0rhfKPk&Z0IOTHiE_GK&x=qU3?ciPh;VoHr*y=DqL zqB`UMa#JGD;}#MhfA&P)*yS-FLW|9)R)16&U596HY8N@?U8Z7_FurQ74LJ4Oh3=J> zuTW@KM!z4IRj=(u;8>>^4^9>^=A9`@_yKManv`+0d3rtW z@L?IKvCRcKFP>BY@Axp6%tktjR&q)rIL{CYHtj!;R#118_=#-%9J`2%uWK+}o-WYr zElgL~i1B*m=Ntob<Ug3LPw@*OOF?FyuJRvtMU13@_kA29-+t2%J>!4HoaTwQssWz4@N7GYbugzc z`zbLmM!IDlvu{0C^}z6aBru&NnEM`^&X)oEGRBXkFXizwzCVoyc^jk-I}@)6Ih)ep zLN|XS4MEG=XKn)QXr*3&V-l4p5sn&uxAZ92u?KRUCE%Uw1q2;FCmruXK;cqn0F}wO zUJ6jH*jd${Jl0JTnDW%VpIiHz2&ew{`+B2pkfY2|1w!j4(TUTy1<-&0DZ9Khn4{Vd zaMPt!LR<3DTLU6`J6Di}*WyuWuIF1?rug)kM>dSEgwBF5X%RL8eYpAC48L+mia-}T zPF|);`Q^VQ-vWF^sdgOIyYW;Hn-nDpw0OztnJbN@GV8FF>H9DKVa*?lzZ0~fUlDJ` zT-I~T2Z^z=Y&M<9L7ZB1amHmI%mol?zMdW-)oil4U2NH9;f%NKO{55=X(n>b5Ei4! zI=S@)h^(hB9eJWo1Nym=V35#u-pj6#Z!0!%j}L&^Ff7?Nf4PQu>Vw2#@FR%$Z^tT} z=xVO_7$tg=Dnx%F{P-o?Y-01}mU=|>AujlpOXv+1OLj`8!PagN&PgGu)I6y9y{pE4 zKCue0A9^pyr0dv1uupl@k0uM>%UL!zn<9M7HLRymCRkb$d_41s5~yQ(KZy|UYFYq1 z`&ZDxTknP4nc%^HYiR}aQqQ^vO;Lt(FP*q=dEddWsrOlWlfb&gklvUdDIJhmtpM`e zld&LlX?Znl3A%4lW};wJOZfoDaomS?Q3?8A1hhX{i?5Tu?722UjE}E z!fAyS90FleqM-`SQC$?vtThnzylBuO2zodHK2iexx9_MZ=~4MQFes3vXSAqs*>&nw za98ri0_CxGq9S5>%d(X3vATt&&vD@>5&)m#s}&T$;AYerMcH=L6mfag^bcq_aaG#h zqyfe!fJdKA@2dZ}yB6T|Q0IsLNoT5na0*jvxG(b=!SLtjA8gsM9Rn2hYwuj7YK&?h+>D>xV~uw5 zUz(+$jpP1khb&6!Fx!gPwS5}@&@Fq%bZA3y8H^gNsgXQ@;&NDXyI(dR z8LxqhUGQ{}0O!l*8ra~m%X)9ybD`^N78t6u)O8Gd+?G7=ASD2QYTL-ujUHN22|TUV zi|X*F@AVNb7W?G2;ED_ueZ2qhS8w6WP{bNk zXXA=-W*F|tsoekq%vomeq%y~kb%|0>9|(^UH)L}fVeJz53ho88f!%=IpAg3t{}ion zZGNnJSLm;hT)RI%!#!G2INLZ|Ouj8DK9~^nQ3`>4PI6;kd($wC$$;8Lz{9d}_;wS~ zi|JM9@HOpBst@E{=QEERpWl?m_?znd)*Z3TkgFYb;)FL_7N zbO0w7Kv-1)KqeHwsMB7!LWfmi}YO%XtOHsHNm|2Xo_%+G>B7P-YYM$g^V_~a%o zWkv)xS-C|FkFC6 z$liZHN@*9s=-&HW-e1!i{Jfuk!97%q+OjX{NVK4Zu)!|fI)!scCnQ&0v;a{$CQ$_G zWdrID@0T;OeIQ7n_>J{Y=lrdSx3{+GQf&pyRO(Z3D>zKrU$^OgM@1UvOA~09?wrXkUWpGyM1I2+dZoBWzF*b~>j2mZ$zIkD>w~3z}v+1>Trsw0z;n$;t z0%3hTrhV@-Lb4PMxa1t0y}mCkA+U6yBMmi}->KnVG5e}p@6Z`scXiQI^%C%A>gLm_ z;BcI#^HXg>bs?MM{mgq#&P(%jPu=iItvK4fe*(?dF-_tiK&7U7s}rwBI3s z`Ku>z+b{6?z4Y>PEOexGha6JuVE44{XdDu&YWjuvaU52g@y_Q+|2Ey2C5oL#6bXJm zZVl{SD#~*vNvZfkw1L+aMyE|T+d4Lx!koYtMB}=Lw`o3SA!6fc2pK=* z-x|=kZ1(yXB;W%W75EQ)Ufm)5Xxu5c{>=O-WEAg-#jY`7Fqh8W!YP9)EL2cAd5Ene zoL)AKjqY-Lg)syczd)s#WYuGfGCU&_Pi-riyS2)hI35!%!*IY;3m;u(;%^VmTf-oI z?W3kqB~s|;h(;`1X2PZNJkF*Ycipd}M93kI+ERO~<68FNX8j~P(eq!}WV&TcRUXX$ zh5pH+a*)zZOhgOeIr-vQVO?6F7PF#)N10juq2ODYngYK{DdBm+MHX|cIzhE(gcecy znbH1-t{9bf?2wIkalycNL^+;fg|O?Xi~3Bo<1#4>S%9@zEqwXAY+F4{(0jCo5Gjj0 z;9TmvUKOz-wBRVgnU6`0wQP_19zx&SSpDs-o}pgZ#~med5^ehI6uOenB-o8I6fGK= zx*86<64i9)M!AArL~Vwolrs7jc`j5Ew~d*8C-5fc&Qqu2ZME{ZIC|eCOCp)Y*jSHG z;e7GK**p_>T_^YCM=vJPaTaj;ImRysH0nA0S-r#_CF$TG1GEJYRLcEz`|xlD@b%>= zml(?X4m6!HA^!$C5j+5Wd%uvhWfk*Z>M}Ixn9(huETFk`Hcu+iJ%HAH?$uuwW8hI% zgT7n}TWvP@wAvs>bMB{i&e-<$4F1T^wx`#jr- z>HJ{{{eX4?c@b$Ckc6hT{(6HG!qdrbh+aZHh9>_770*M80lHa2ZU?s=uL&kT;z5P_ z>7$S)cv|N)=m}W6o=67N4pksR6aCYm_O`2SzH?f>@nLy@eyvk#r@PlbjIRgm z4&%&)%sYPFuXl$8MnqcS2bRBF(dhl@VMHRyCAQyBZCm1{?9cCNtW@7${o7YiG*8UC zI#h!2Y%&eIM2}nFV*BRDDuM*6F2WlEODNrZ!vGcUl-01Z7b`^Ei*x_~H?r{{0pC4P57&hOG#%N<#VpiK9GQl{ z6s~a`a(p4xALxlQ=0WdoubCzBg$s)MbTmUwSA-F`hTefWtusOLPcaE!=C*K!(HR}3 zakf40X+8|vo^!1E{mJD%JUq2av*A}KZat(!w@pp?NgGTB`$y_{+}Xp%yjjqXZ(A}x zfEe~pPE9E<5huEV8N+RJ=n7#6iKUQ&JU@7=NfI-D>0%3{$*5uGTTSgrZg(oyr1_nqu_OHRgkT_IA=5h=8r0*;Zy9Tz;#o3JN> z$QfF7%KMlN(YQ5dS1ppJQTK{%K{uD=-^r$amsUv)=^%@ozVG=MRfD5qEn4dtDvgjO zU8zbH9I}NL{xW;0zaeos2e#uQAw5{&xtH2*cw_AhbA|A7!SP_r44BD|To0{F5-2t# zT+x=1jdD({LV|I`N4l5fzDjZAz*^|@*SKNA*}(T%)8{rm7Ymy+8y!^m6+XkP;wF0 z%7(PQrk&h+5~LxcB(EKnDJ>)nC>^pA(`px^3w8=;sU9V>qTU&8P%ATEVQFqNF9DbPbbkb`4D1#CKx-3{Bl zE&M5S=B2E3`tNVpAhIWYlppU|-IPfUi$FY3zAv%Bt%uh)GVu2XG>}{b05*hpO+1zU>nP_^6lnEXxQu!V8DDx8U}enny>)? zAGj9AIQ+o}^u~K&aXAAe(f+bOU6P>U$qE)*M9J&v4E{i zbaU8h_Gp@LDt`CfjPsPi>D6%5Z0ZhOoM2jr7Q)tee?JYq%Eh3e%$GA-hMRJxU0Y`M z$cOysl`F4V=`0Kv0qcdlQc1G#t|ymd)gMT?fvgL2n6X({kRMZ;)e}ZcvJh)CW$f|d z=KxSU0c8I>6aokKyVsayKQfa2lZ+dnLB8El-RFCyP)`dR3$Kk5a zBoU&?=o|vg{ofg#e+%yo%JiI(I9`_}aR|DDSs5ktZ)CAN=3pL{K|QuZpsDYWU$5`i zK2sp2SlPeL4nN7yqo%4V2{R=9LPJ=cmwSYKh+|7F}wn*Bp}tR)I45T zzat-vM1QTo%0pmOp)PHck#hUy+-n!Do_gNjH>dHj^a$^YLx}xg@9MGe1|Qf~&UEft zMttw)RqF{TTofDCRzx63uGOU`X!STw4ppYh)3C_<{}ii5!DA)!)w*gq*fO<}D;^Au zlYedWIr}dk?Trof0tPihF7FZmp^;meX^=Sc5KT&+@2uwh;ik>I_pbfXz0a)fU#|y6 zvxP1%vi%(HrlYfvuXVrQdoql8&n=>rxt)Kce==p@6t4~mumhJ3f>Psh0Fq^3P9CsI|eDX6$l=3vowONM!o}}F9TU?NuQu;H*6>rVU8*H_SmhQ6^@T| ziM~=33MEvr)4Vz~zR{*>E4&)1gP->fff~yV;8>A1?z$J__U{$QsqddJ5|j>M_vrgK z?6#F0*p=xm&e)||WyILHS1Y&H&=%Lk*r{&+m737A{sUr_`PwvIr_H?Sau_w29fQRUx9efElpQ0l~DIuJDTDVkiEDw z@^v*Nf_|#8e%{lo%=gzID1h1!QK!Rvp_Vk*yDI(oDUau*ZS6%Qpsuorj$8manqMFh zh+Cvv+0u|#bp?1Hu0WPMSrpY(}WH8Wq$}dc+|-h5>L0 zm)pn|zk+D}wU9?!BHBa+^?uR8RE9H&BMZc8Ns&un6+IyYz|A#3@JIIt(UMCt=BlCR z($MSfV9?<>6aak00c1N?h|&{!?1{pGs+imFoq!~#Yy5f&sU#4Uez%v=-aNb_2lGs# zOESvGfkE(K#9xD;IWvgSeg99l3CJ(Vgu~7*%nS^|W$Op+9V81xqnL)(y{*bwm>!`g z8*%QlO{&4lpxSpTl6H$({>$?Bt)1oDGvnleeAioqdFJ}xa;lY3G(4|TyuI}G^=*pN z%rC*#bA;X|@H-C&^#bSkkhiVTB-*XgxhT*#1GP-^(&1r7`K49(kBjeY21U*1@55aO zio#qUrsau~(_H_6 z1r$`l;MOPDm-G_;p{dj-So~m~J;)e!teC$b6s(82lzeFB^XLogX>Up#yE* z)o$JO+1=QRA|xOx2ja*tIN{4+R_fRLpIW+ zX)?JSNo(J^J8#{i6ciHpg{&L1sLvd{2Xna3aI^g8^}4?_5gD{Q(Y_5e{PNr3I;Q2i zFG_P4RgnyXjBsbh<(lKcUHE?J_8@$wcGnl{|lebpEU1 z;W{kJp;P~t{qb;S>zIBeo(OIu;Vy^mR|LC_NykcL;zX6vd~B4*N}Z=Yp&lrtS|F~Y zl}$t8JD?GKF;J0r@r zM8R&)c=l~{w|UZZTzbsg5Q7{pdlceM%ZGRmT=`?xjqJETJSx)0BiQnuiXo(!BL(vW zMIr6?Cs&(9iu!-#MLmC#`-0kIk54?##`6}sZN4`(Ca_8$7vy+$>u4w>^fEkHi6`u- z`1{dr$;B6bkh`BK{ky-Nb*LEJNa7m;I}Xw?9#MEIpNAl3jhYZ<;6-KvChJd(kngt0 z(h6pM6KAIYG)nOQ1t>Jv%i|TeO-a0pcJe?dWOj{IYuKWZ>=E-5r6o#H9H5L>eieh4 zq7B3`gL9T7nHVdlo7{68i`)|(vyD|RX31N+##j~X(i?gweb}Wt?;+5pIyDr6Jvb@Bu!C3*`g5a0jx&dMwskP=y$+_vI+&K%foG1# zS(dS_ef>WG=0~L5wIe#~cbt6RKKWDI z{V7p3Peh-+PL3@0y|vGiS}R7p=-p?()aQw2$aq7ymy5?enRjC7?E8j3TZG@FxA2=7 z!f&DpKX2%Ec65k7&pPS9?E8j3TZGu8w-B2cjBQd9VopCHb~5dx^s?_8`fOodlitj0 zVlb~siFx(2bKH|@Ck>Z<-`3&bo=iIKn@Q8YvGB)9Z~i#eU0wo`KAxRVbVQ%W9oNu! zept(hV=i4Wi~x=a#mk+vU&O$66FesqyWknuy5+=+-UC|}JY&r>=V{t_w}JILG9=&5 zkj6H_Gwv;T#)jY-Yl6oe`flew%NG=`gy22#I&M_YVu}i4ZT;^ngvN#t8f!vG@4s5( z!hihk)!U0_7iT}ey|}vg=H>IBpFMwjasK@36bx<%4hPaB6%+8{@(sWlfLVrD%t+%S z;&$9>uANvaom&}8kw~}77;P-Eh2nFM2s~NQRGuI^PfiO$vCTCV=$%>|#Yaw#?5*>0|J_C2?t&0VFWZ z5Wg;ntugTpACPIwAT~81Q`hcp^K3iG>%EiQ%78fa1ETGu>+AnM0$111E?)5=xVZcl zZZKOIrFGD8PdWDEg!=PG@uFw99X+y0Kr*{sONvt)wIg2iCZ(*QI$Ge4+t>LwJ?ZAS znV#4kH;zr2b$Tnaj-kvtC1tj6pJ%gfeV)x4`fO2Vo!-ihu6ISr=cj(r|C_1Pj-o!(N_F@%UylBzx3h0|{FJM8<0K3gP6@7Rs`$eS5`mJ)=C zkD)iO6P!vwG8F+HffU8$hK&P?{m*x?sS}IXV&^8XVUQmbYedNWu3Q; zXHSJ-KJv!Kcuw^3?57Y+Ix0aEyAs3*wDq~CLNFhBzR~Bg*5{sHkIAk$U-ctyPe zz+Uw3vuE_#*ZX`@x4R}C!*?e3@Eu0HZ9IBv3iFZY7~|pU2sTKe4be6Fs~C*?l7^V&Ykg{%}K9*`O0B@ff2;NRgQ z0NXVBYsPoIN>;=1zqxW`?M_`9l6Y~aT!Wd>r4zkN*29R(fiR!Gj-r0zG_Yycrqa2+ zRXW#D>0Diwxpuos$u{8=7@`ElA&P??pee+$wL><2&F!tP zxrV;xPHQ`4pFB2e1;|=OU<{glZF!I>PnP7yvXR}tee|De|qPaZBy*k=WJsjJzn>Yo!s#N-2BdnT`#6#0z6cuOVdXPFL;QIXhwV<}63t&7J zd2J}pwkfKI4^srnH8E}uz5+pnV7yI4%_Yn?t|%fDY*S2kAYle71Pe@6ZieVDPer0B zUae570`OHnp=}Df!w$Z$9@B_jt2bLn>7LJNSRlnOwLt_ zfAdusq9o&mN!YSmtpky#7L(hNb|*6`KOtFX=rW z6~mBlbtRI!*y_o#sdl|JJ43OXn`D$Hr#t)k^epinxrb%YZ3<{F{gX8`R8L*=bXsVh z{W+SYgEoz`x58-%^g`WqhrZSOb01vR(m|VY)>}6-RI`cJLC-w*fYB}7WirANGEEw8 zkW6NiDLiBe0+iCBs`^c0H7H^zx*a-??KvKE%SqV0??KpnWVpS?`cRmrg$S9J+JrIy zBOJd+R`bv1wCeA(D%0!h^jbX@<+bUbbPKfePppA2Cs&w@2z2T8^_1;^ZGv@Smi+1qs z$&+)-QPsTfN!5uty-sZh)j8G0CW#P_dEw5O3~!PMFLA(2=*hgL>4{@8lV&z9;3$ zt0n;E)Cb#)l1*`r7{LXKxR_Ao&qs3lIx?o2l`+|}etReV8acnS=IK+R=zQ7g@#w|% zQfnB8k(^K|Qur8j%o_9US!1>g;NA(q({gms%(4J-_N3e6)dT2q?3%o*L%+^Y)m|3E z(s5_o11+W&eQMfQpPH8SscBiCGM5I9rPh?BWWj8@2=4d@P`p88D-Psu5qytQknJ*x zHkSC^sYMx@_Em%Ds_sKP_=#*IsxbLsXsJ zisPFbez$87LA=Rp|BJFNH^E;e%juYp@7we7ZRz;Ev+*ZoBYaxo#M(G$>{i(;>Ub-H zJDb@uv6$48z9#jgY*J53CUs33J@@*8Z3502)V%Jc>vuFIeQrwH)_F%0-4`Z$PARR3 zxcafIKR=rEjnSQyh45rF)yJ|nMp_)ppCyUtcgIu!-<}FEv53-1Ur}llnV6JBsXZ*! zm{_OdDsdWCiPx>n9{b+(-HONve)hmGF#zIQk&P;I`f$9m4RO7c?_JcwsA(}NNqOxw zHP_-Z!r7-RUxYRbl!An0bd{p)mk6YUP>{eZyCrF8>qEUD?_H$As8KN~3G%i_Zr-e$ zrsB=4nu@I?Mem9fMnQ^6Ns!mn61WnU@h(p+3Q-b~9W$MeN;yk|Vl!ca}WbUUzqii(&o2@Jo15sU+rf-^QQvisdsK+oi2Am0C%)I(edZvgLu3*D*BHvxjE- zwiqYBcZ`#7#5nnSjFa9;6{1#{GawELd)N zbLNxhcid8b)0V2&vHjk$S-ugQ zsfqc&6c_#sp9c|6G6WKsQs5l{7{Y{~P4Kdg%ywsg1nOcHJ{In*+kSIr4KYk^$Abb_ z92C@f=*4V>h|2P`BnBCU6fL(=lp$)Jje3RO?|DrKZ|NGd;pwwso<*ONWC!pE?jVth z{HSscN(l(oI0{8ceTyI2x5ZBRJ!7YMOLOD7^_`Kr853xHCWim>?UmY8LcUcx#k5s1 zYqFdZUGrm<46N`Cip5cq+wmC1wI8GSwkRsUXA~7{IX8yK(T8Vd%=Q1h%_vAxa)Uzz zZehx|7w>$q-jEP1Ar{AJa7#&o(hbfsF8%pPOuAV#?!;=*_?7@Jzi$ASKQa{9xjqb4 ze>Jo0ZeYrIid+`LqM<2*n+V4UgbT1uqYS{6HKg0OL`3<0BchC8d|!)*lD()W!=^>{ zRw4}@a#lN-`Ib{I15KK3(@3UxsB}-aW8$l8Pki+)o>0H9C)6mX<&SiQ(Vo6zFN)`O z^!U4WkH4+xR_~fyM#(LIq^oT9yd6VscJ!aS_E0Qag{|HNwv75({zzBVcs71L88)@3 zw^n2*MSeRnZ2CZdb)Za!*NzOUB=1XxDaYH9VH21=<)vp%iqnP+Tb-ibWr~a{MP7MQ z##S=wC#84cAfs-OSDq9*8TFIWzg&+w8crKB>aQ<3>3e<2$;d1kR2~gmEV{LfPv6mS zN;f*56!(ZU)8W|cI;Xc?=NNXKquF)NTm<-9NU7g1PH&^eF^n2VGivsbQa?RTZjCwt&cWox4G?P>4L5vKWHDRld)U!NNzD~zwTKsmj z*!W0)Hc}?TYez=Cr0HE+$fzvj6q2Ty3>z!EOA3~2t`cWIEi*=P-D(vt`cN}7Z+{y>8%p1bEcG>8!{Q&3JOB$k8UZF;CspV)y6sPWIV+ZZXehHnBVFEp}&y*qxbT z*M3<@$wZrXJAahPM~I?mr!FGf#@h^qdGEOYKHqUD=9g8KzF3l!jfbs= zb;{DLud*~ND=0HVPpWiJ_K8H6*mC{GHPH?E-EkJAIH~uK&n)`RtgpT^E9*NmL*J>H zG;vUIlf-7^j*Z?r#c0-7F`AVXqnV)?S;~|0Ru(dPdB9l1ahZ%s)38b21LK%bo-Xtf zXH=|ko_-?!6x*0_qa-B($}(9;TVB)_>NyDWZnu%oZI_YHEIQ+?ug*9t>x?r)XKd*l zoOcTkn2YFua#dy=HzrGqlXx+h-QqFkA{>KbyVxWtx#1B`{9g!!v6xu4Mf9ukvt3N# z2P|i=Q?%dQ7VI~(sM@o>sy1tAC=MmPp&H=Axg0M7FC5tG?LxcGf(`VG@6KO?4Ng-z zwUbWCGxN!bS5=V#!IwKhJWbs@&^TFuG z2_}ARZH#mqpJlH|{F)Fx7X=S8!(FLLtmKi)#>8|pFl-lL%`8^mtgqEKH7>)M85Unr ztyo{CuTe(RZ9qlQ3%=O--8YO^Y5}svP!&r##7gRQ%jcTg(z&L#8+E3=Z`7Ic`z5r^ zKh>_(F@_}2OVCxP%xc*70ryJ?6G5$CAqWp7#y05KWy@*Zs0R z<5+8U%05z*(IRvSi-_NOx5^`PTj3E&ptaZiCwy*p+A`tg3IW?hW|G5*yBA9FT=JR} zUIPXObPJn^Bm4;oKRQ*||T+^8{STGzlgQ4-UTF z#v%?d!iyB9JFdxGr(1L`Bk1;haD{oA4TuPL2r(t7cq?voXX01>y(C-{fgr;h9KjSM zkW!S!M}V$zmgBgE8CYy_#6@$8cv8m(;+UcsGIRmSC|DqRi%=}|E&-l;E1x-U(id3#Ayd%nlCzv0b1vMigbI;N9Q9cKOB6L+2g; z^qD3-4h}wo*C-(wrX<~gkAMg3eFSe&%B%tK@!;c7dp?%_$Nt43UgYU;ydQj+4i2u_ zVBicu@EwXa;H4ZEksW&QkTR76QB^ z+Tsvpg(xWa|A?fk;|+|rFgpH!c#A96;xC@_g10$#+~HXm;&?SI*23{2SmHFJqk|#1 zLWpC2|7RehFb-iF3akRt2wcR1?dLarF$j3W z?J@oGFBKXs7A(Lq=Lq8LK`}+nGWninJ>Wk4#jcP`tN|y6l033FgE1ZrP z1vN4s!9Nh=?$^77ad$O(>|er*uJigTlOL93z`;jw{XgI%$Y{zq{zvd`@aFn_@D6+g zSBQfAYEy8HH|RekMhvoMx)yhzf{)Tw%Ygj)8;8JeN!v|J8Ta#^+U$vHTU(tKC8wtr&)RG8b3>M<>WTdEOMyEz6Pau#H2MiUq_8Dv*u>5(<8un)r2h zX^9G@dgOFKF2Dc;4A@XY6GU;BN)Vtd14|qswvuTJ0>34xaAV?lNse-{OTkZUb%rF6 z!j{Q45@aLIROeEQY||lU+){K&t58xtlmmABL?igHepE*M>cEd6!WmycKMjUMxTWjC z(I6%<8vIMGNNpe)Hoix2i~vkme0ydiwrDdPqT(*j;c%OwbQnSkhapb+U=``M6huVS zGZR};fG-WQ0wlbSnWYQD`51zaU_l6*%y&x|Wr$J!T>2%qaa^6kVrk=8UM(0}QQXw+ zGhQ5E2T**2QxbD7bpun(aAxub!U7%Nb5`&##RTN@zz3eG9R)yn`7sIws9PLGY@G>n zof7GG%%@5E_q1**WlOPCG5Atf*IEkiF25crQa3FsmRsL}6{fcR{X-%+iI4+K#6T%#B)2wiIv2gR+mM|_-9Nf0AM6h})^6d-0xAPeg%lXfM}bgQI2 z|9~^TUF4~+oOt$&IRe+pQUd5h!jJhdx3CsSY{Z!6JPUz$IQ%)y;JXIqI>PZPMOoHj zFTxnek2PPp$yaS?Wcqpy8m7qWSn^VV-I3gq^gWJO&v05ES76ELPge=SQRiyL}R7l$o;$_+n6SBt#&CloHR}#q7%MnU+KMx z5zW?wR5oP~p_hXyBpyx4mMv`lv%JVRFYSWqns47r61J3vHFS64={be_7`g_%A3M)6 znY>(wd{3M_$JLRK=j~c@@gyZ13UPD~OC<-TEtOn9ipWZ+*4Y~KTMf8&ACdRC`!Z38 zD%wk~uH>ZDD=W3Yx~w@3e)F2sp!ZvIIVN+>>5%Vf&E>c{uDQHj$2B+Ni^8Ovt+fQw zbtV?biYIt7G=kY#0KLaGB9Vc5^ZF$N^pby3G`&gU)=SbKMy<{ z-X!s%(e05S@LL?A@`@bD9WXd$()4Jc4z&lTgX5bdK2~i9#VckE4^9UR7B?BVBvS3E zc$tIYEB;d2+)x(B#s5JfenkzNSXun!TxcZ9gl9|O?d7YHy*s1)7``mHOT;rGeq7^V z%@>(kTdburaTikVmJL`NF6j@@@bS^mbOo_kO5ejUWGb*&01LEaYl5cyOG*TGv9lmu zkNDy&+|kA!WV=lkJ*kje&vd#o1|EXfjVG|Z(UKiVO7Dq@eR^7%c2~nb3X2ED45B19 zFjjUwun{wrV{vd`a>#F4rZOx39a zI0Gmq+tu16#EcecWR6U3Ddd`qNcFe^tBi_Pwu}lptf<%w0sDLe-oglnYNd0VN;NtH zYDP$^#awfw%O#F6-PP=ZXK0CIW}T@|0upEZLNp4}EqCVp^iztK|0)g+-sgL8gbC-+ z#{r20l+f%r3)U#yMmSy#(T#Ac9W!%w6%P{<4r3Cc<0lH&5XRvU#uN|LFOo?|369YP zUy7F1B|d3fTm_I(vW=ok65+tGjW3q32)z`hUS-VB1PZYu7zB_=5C-&AKlRd}uhv1z zMo2$h;mw*+ncyj0mEqp-T1npjm93#SnVx!c6#C;62RaCi{pAcUrzh?bg_Cf+3_N!- zai?&xbc3;rV2Gx3|777!!;@ehc)@IP;x|*nu``P5bj%-aP?|C^#*H`jg|ai10axq_ z4rEJ77QjgKB%j#7sU`e(#_GZlK=2(&@qbv`h?!8}Og5Bo3Ny8Fk?3w9`$92*^;;~u zd0W3?Of(%406Fn3)vUQXCQ$0seQQtL=rB8^K)e)Kdu+_RvHNJ7gJI9FO|QF&kU zxNwD*$y9tZ zw71ND3^nhjxTC6GK4j>P`uYR%s>%5pS2-YUIkGl_oaBT zr{^>!QH0VxL&?N6&_9vdZc!xlSk-*W5Iqhd+K@Oyv;j-4md4Fkt?=mGG1@(RGS*m* ziu&GcZyjDnYH#iG!mQf( z24|SW-{FjL+Lw64UGx%=&t2mJ{uNIU5?_P0_#8yydjlrn@hNY3Fy$zLDaAsTX#6$C zks1iCli;=96lhJGFl5_wg>2A^(KLW>;0GXEHUZzp@CM?DucbaHO6|*tm=;OVYG;F6 zUbvkT?65q~KYOJ3C^!Hx89C!ZhF4>H@N-QaT)R*IJ26;cd8*lW>J<0sRm^ zLlL5=+PnZg0?+soWgq}v#oSh1Ir z1S3a8)RvjUPyZ^(W3AvY|E^9bzmaswX@;@RRv2<5uZO~_>>|IKn`~o#0`%tUn>@Bx zlkfbD-!9t4YfYl-rIC5(;!JeI7-D9(3Y{ktLoH`=aQc&YIXE5gYORB#0bhKB(}6qq z?O#WO48b&5qb#2nbzBIZy}DB8zu8f)ysGdxQTtV(0UNjjDauH6gFu``guLG->O6wP zBIQMMpJa$`6S;cBIIGckSWf+RzrEtgX7h) zbU+MYB9fxmR1f8c$4`X6pV`55jnvPFvX6D{sP7?;>**eW>xz1I#Z%i9uQ&x~hv52u zPQjb&bMVa}xIDYM`tjK*`0KB~g3)Vv^#G5@{Oz~Dg7e}7{-F5g+mvkNUjU3oYA*Qi z74fcKUMEpaKh#?uFeKa8fAfK&G=|YdOi{Xo0jk=UZ!#n!qOiJ)VOrn_L6!8oTh6l%m+909fOfuinQY45a~^y5y$i!|DA5lo;jSq}gCVD2c#G+p|8och-N%P{PZiUu8Rs91gcAMB zqTt1jY(?enoZC_Y-dWh>yBuZ39V+MQEQ-jjat3psIr_jj5vD~m6*|OV;U@2fgjw&p zz)cQ|QcL}tyrJoQD78?20shyOx*@QnKJiyva}wU3{3|F%fGtu4vmHoq@LrkcOP+YF z&VQM?egyC)At{A1wd_n4k+Ij8z?#aB(O!2#@nK(Y!Up2_uL{mcCw0VL?XiCIqo#Vx z^p+n2G38;w=8wnzhjmD{lrVu@xAf1pltk>EHZX!atN0UswH8U~k%$W7zIlF;KU<~Z zM&V3vT|deL7i+MkJ4!h(GtJc-!K`*Ibi|=q_`@Zpbexr;8AAhTxHI< z&YaJ7G447vo(`HMC=LZ=ktxEF7Fe=87AJ2hUTX4gtI8*o4FW}9vHqTBC}G+fIxG>w zs3Th*jYTr4<8BmQ6o)*JvO3b7Yyaf@i~pm{I{20xq7QJBL}(O|07jgVFea;ni|GQB zyOgU7bsHf^$4}?gKk9;{F8Q(Ly@0PCuU>MIEZ8DnFu%qDS^<{(zS+S>fhBy=F${n!s)ZErs`PZ$n%0G%C;tk4{{;h~-Qvvij zlAKA&T&YYqtay^tyh?-B7gxie<+p8l^QNB7C?!@w{R1aHS~S z;8-kBl7=YVpF<)q3vBF`Ob;nOQQ;x!Ha_B4D~Ku(`4>k#{WM-NjR~{qrV0;VasqRN zmnhf;W~|h2?<#t6@uiwvwhoPRJ9QbUMblQVwTo4%=eF{r(KfAfLj+~dCf`di7IuR0 z&2Sx&ZA!^z-@JZ##Xj9;NDJ6x9eDQ5NXOWC=A2)%YCmw+!Sp+AR!Hj2wG#Xe$IP@QL1o`j3gb!W51Y>I-#bQ$=wsq6ZSVC;te zIE0?>1Y^g8-QtK9qYb?DFSzVxj_cgp~DOmUc{SA*m{1B|qYGf~8_% zfaz`o8l9_vEF24WBTcNNsx2_60#hEQU4pWaJWt3@3*`dI|H~hSsF0j733X45$yr~K zkg4I3yf8_N7rXaBv6zRk2ug$xPKLNOZt@n9hdP*kELg?b1raXXOy+hkq3N*OWxJsO z-VS#K-=2-X2z)r1F1)~U*<0PB7;<91dN11A`Av1cPKZ_geJ2gA^5Cugv&2v9E7=Ni7=PrJ zSSc4kroTwPMcK9(l@6=l9siB>@n^F9nXb{#qT%1)9p$GYlz_hu|0<&kG9CJ2OUnyG z%P_Rg!9BYq)ULK*OA!otWP8o>R%{tB^-fjtIsk()ER4JwEE)cfv83kn`3sz<6+tmE zWSR31)tMCivPBuqdsNG@Y*_V+H|tz=5|{X(Tx>FjeX-=HZEPV7-yMN)7sCw>1b@pg ziRGn%D)zY4Ais<7-BBs}G;fU38b`OBLLE{@Hb~r0h@uP$U_9Zqe7UIJavSp_UKE0- z8tOy7B?ZuU8%0MTCe^zUnaac2JEBK`m+n!aA~ij*5C3*y+mLUhQ!60xzf~nH?(ch7 zVu|lYat$&)7J_WM7;?uf=Cu(-2DtLwhQ*f7D}-X2iSnEl3ac?z$xWbwtE#M=e_n~M zIxQ|nKa&6a?(zsEH^C7=n}qJ3;q*v4!j6jA)1#uyDU%Je0f0fZCQ6CrC1&HT#K*qp1KUSoR$6jZG3F5{3v5lW z`;KIkGgVO?f#6uHZJftIGJ200lqHFH7B0!p$3^wXNhHzc_{{?H9fknhnh9+iP&uxjU3mo^zU#-PZzg-4A7D>ZX*)~#|?cFqdUBYO~ z_whT`pLg{Hh3KXgH^_%Y&~rZ%XQRkA2_d?jT zgDG+nIb;l`U<3DS|-cQW-}gKS*XEzL?ws0(Vf#0 z+a5f^d9NLc{W^G$c7xM_ssb@M8YH6f%4Rp@b^DJuyJ7zJw|^OmxkM}AHrsp#DSra9 z$>@>Yh!!6<8qjheTUpNr-cM|>WowvnpML!rQl2QL95@OIC4e{0%cPess><%f-#D%i zr&R?)P&?Y75N~VG2~^Ob{DKlN_#SOYx*HVh4FbAJmKk{Z`t1AR0&*V750-WrMVmw2 zZ^q|NI!6`AHKc&Gl1J4ftns@_Iy3wqq;h2Ijx-p6cUSm7NYMBVr$v~-**maAkY6>k zVpG5itjM|~JF?|x8JUW>0^F_4bM-hNAbTZ8v`QaE8+(d>?>Xn(3T+Z1D!IvVtHWJ4 zgKDBaqiN)%ezuc%15;V)><_VbCApvf=2e7#&J&+*t=j5mIPd8;{)6mzN$lr3^>@wy zzsI!ggoI~%%Y@X_>`0MUTGY+swB(yDve4GqMVy~NqOUkA(V1yi&Kr<3W) zk^1YLmmU{EQiIdM5B!?F?{T()G*}Og2K@Fty&eDIO@>nWw|)T^|E|b&FNY5+;(($~ zt%}RM11W`(tz;utHGk7LsEW&%?W(7?1< zDvz>DG2uJADbML#oL;GKL68Sg6j`&B$z)!IKvo=;;hHjhU!=6ymPLzWFbcExTsn)L z&qF?Q!LI!t;TsgAEE_V55c7ZW;^Et5C}>dUX8ezl`rJm@OZA?AU$<7va7OBMzs8j1 z>;(%GUw9Rde7bmS=&m)%q-YY9EA$U7-cqdtRdDF}t@l zYJ#op$|qT+lDXQ3=t{ocvqB}5`(2+BXk~ROWUba_R_Z_vlm}gx3h6zsN`0j6ZB3Se z)^y_D*CQ`!->iS;h58$`PaRNC-LqWRzoL1TFm%y7Wy5_4t4OLEr#BiG6@lHEi=2}% z2tzlV2F`r3T+YYyz@G(Zyd2La)5RPi$MwDCNq91z`tJN>x`fd4{K?dVHK`p2K}y|B z7tp$Hl~)JI`ZljgBr=J$zrVq8sH)R2SfikLx8GDR+qXKJI(QP-9l$nGE8jJm^k-FX zKuhR%09(N8kqyyh>Ugbi3yH7!yC&kYEpKMaC&*vRGtw#{BY@)|+NvrMa6xX6JW>l4 zJBC4!pMIt(Lg&YI0~-u?kC@)Tucn+BD#j=Vx?HaPut5G32d>0sEPrA9{hGRkkR2(8fb zEPxST=F*pTG|&rxvgK2)BziPRRQoV*rp|$16GFeuo!;tF6z(5dY`j6(?Y+ z-t(23IE)YrrPQ1oEm~k!& zvoWaZn-RDY$2?sspVUA`LuVd=9Uq|Kke+ZaG_eSTT0 zdbmQg*r~isE!#hDUccmT`M%Z;m6|$5VY)(e-^wj&E^6N!&K2S4FR^+)0LzqYg#KLA zH0E!(8{u66@EuPwRM${RCxX7d6nl~Za)qqcJPXG0_q&7x=99pSCrSN^4N)i=j?&JG z^!1$oaTkVdRg}+5>lvWN$@lQVDvpjjCM#W3)uTq(o?WBhx7;|Hz1T-CgmULn{;dh6 znv*Hbw2RA9#DvZzbwRyJBJ`9o*M(%Rhest|djxWLM+MK-$T(B>U86^$#uzNO?|m;z zzU%FvWg&ZOXe3jdZr6y-xn4X~0xYyCW!cuCu-u+@U5W54!xq-(NL|XC@mPpZRo<61 z+K&JfKyap*77C>kkLrb?^J$Gr4}?KZq+6sNVl;l zIVvHQuD%fv_%x4JDGbmhN-+>A2VSe5f~103;#GF z;qb;iev(&GJN#FLrVYw6xI(sw`Q@8QiTJ*V+PmLWPGBIun{4nG2heZu1b)ZgZ zZ2))Yt#y6<-{p-ZuX*|8B@7V^)&PZ=-%P!VbvA5Jb zFm8Q0)vslFr(Ilv;}GBAa0?@5s=QYv%XulujKciR`~23%#$%5kaf)8>yB!Q6ol93756@|JsX*5Ij$w;4Gj&+%Mm?vC^NRx^mk%M-^v@lPfvD4hDU`C_^} zSo;(3p0gM?>*+w)wI5;@?2woBJJExpand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -199,8 +199,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -208,8 +208,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -325,10 +325,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -345,8 +345,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -354,8 +354,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -471,10 +471,10 @@ hide: | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3+deb11u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://www.oracle.com/security-alerts/cpuapr2022.html
| | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncurses6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.36-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -491,8 +491,8 @@ hide: | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libsystemd0 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2013-4392 | LOW | 247.3-7 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| | libudev1 | CVE-2020-13529 | LOW | 247.3-7 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| @@ -500,8 +500,8 @@ hide: | login | CVE-2013-4235 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2019-19882 | LOW | 1:4.8.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u2 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -521,7 +521,7 @@ hide: | github.com/opencontainers/runc | CVE-2022-24769 | MEDIUM | v1.0.1 | v1.1.2 |
Expand...http://www.openwall.com/lists/oss-security/2022/05/12/1
https://access.redhat.com/security/cve/CVE-2022-24769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769
https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
https://github.com/moby/moby/commit/2bbc786e4c59761d722d2d1518cd0a32829bc07f
https://github.com/moby/moby/releases/tag/v20.10.14
https://github.com/moby/moby/security/advisories/GHSA-2mm7-x5h6-5pvq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PMQKCAPK2AR3DCYITJYMMNBEGQBGLCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5AFKOQ5CE3CEIULWW4FLQKHFFU6FSYG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5FQJ3MLFSEKQYCFPFZIKYGBXPZUJFVY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPOJUJZXGMIVKRS4QR75F6OIXNQ6LDBL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMAHZ6AUIKN7AX26KHZYBXVECIOVWBH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQCVS7WBFSTKJFNX5PGDRARMTOFWV2O7/
https://nvd.nist.gov/vuln/detail/CVE-2022-24769
https://www.debian.org/security/2022/dsa-5162
| -#### Container: tccr.io/truecharts/snipe-it:v6.0.2@sha256:3acd046042d62cc699ae9b8498eb88a9464b4767341e89bc7ca86dcc6a860625 (ubuntu 20.04) +#### Container: tccr.io/truecharts/snipe-it:v6.0.4@sha256:4a90eb7e0c4c561adbe83945b9b0e7d9f1afbe0e76e7f75153f54f5c04c4fae9 (ubuntu 20.04) **ubuntu** @@ -529,10 +529,10 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| apache2 | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.10 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| apache2-bin | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.10 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| apache2-data | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.10 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| apache2-utils | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.10 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2 | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.11 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-bin | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.11 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-data | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.11 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| +| apache2-utils | CVE-2019-17567 | MEDIUM | 2.4.41-4ubuntu3.11 | |
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | binutils | CVE-2017-13716 | LOW | 2.34-6ubuntu1.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2017-13716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
| | binutils | CVE-2018-20657 | LOW | 2.34-6ubuntu1.3 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| | binutils | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-5349-1
| @@ -548,7 +548,6 @@ hide: | coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
| | cpp | CVE-2020-13844 | MEDIUM | 1.185.1ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| | cpp-9 | CVE-2020-13844 | MEDIUM | 9.4.0-1ubuntu1~20.04.1 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| -| dpkg | CVE-2022-1664 | MEDIUM | 1.19.7ubuntu3 | 1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
https://ubuntu.com/security/notices/USN-5446-1
https://ubuntu.com/security/notices/USN-5446-2
| | e2fsprogs | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | gcc | CVE-2020-13844 | MEDIUM | 1.185.1ubuntu2 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| | gcc-9 | CVE-2020-13844 | MEDIUM | 9.4.0-1ubuntu1~20.04.1 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://access.redhat.com/security/cve/CVE-2020-13844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| @@ -565,7 +564,7 @@ hide: | libbinutils | CVE-2018-20657 | LOW | 2.34-6ubuntu1.3 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| | libbinutils | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-5349-1
| | libbinutils | CVE-2021-45078 | LOW | 2.34-6ubuntu1.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://nvd.nist.gov/vuln/detail/CVE-2021-45078
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| -| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.7 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| +| libc-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| | libc-dev-bin | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| | libc6 | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| | libc6-dev | CVE-2016-20013 | LOW | 2.31-0ubuntu9.9 | |
Expand...https://akkadia.org/drepper/SHA-crypt.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20013
https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
https://twitter.com/solardiz/status/795601240151457793
| @@ -578,7 +577,6 @@ hide: | libctf0 | CVE-2018-20657 | LOW | 2.34-6ubuntu1.3 | |
Expand...http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://support.f5.com/csp/article/K62602089
| | libctf0 | CVE-2019-1010204 | LOW | 2.34-6ubuntu1.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-1010204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&amp;utm_medium=RSS
https://ubuntu.com/security/notices/USN-5349-1
| | libctf0 | CVE-2021-45078 | LOW | 2.34-6ubuntu1.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://nvd.nist.gov/vuln/detail/CVE-2021-45078
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
| -| libdpkg-perl | CVE-2022-1664 | MEDIUM | 1.19.7ubuntu3 | 1.19.7ubuntu3.2 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1664
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be
https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html
https://lists.debian.org/debian-security-announce/2022/msg00115.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1664
https://ubuntu.com/security/notices/USN-5446-1
https://ubuntu.com/security/notices/USN-5446-2
| | libext2fs2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | libfreetype6 | CVE-2022-27404 | MEDIUM | 2.10.1-2ubuntu0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
| | libfreetype6 | CVE-2022-27405 | LOW | 2.10.1-2ubuntu0.1 | |
Expand...http://freetype.com
https://access.redhat.com/security/cve/CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
| @@ -602,12 +600,10 @@ hide: | libkrb5-3 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| | libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libkrb5support0 | CVE-2021-37750 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
| -| libldap-2.4-2 | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| -| libldap-common | CVE-2022-29155 | MEDIUM | 2.4.49+dfsg-2ubuntu1.8 | 2.4.49+dfsg-2ubuntu1.9 |
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.debian.org/security/2022/dsa-5140
| -| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libncurses6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncurses6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-16-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-16-0 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre2-32-0 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| @@ -618,129 +614,93 @@ hide: | libpcre2-dev | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre2-posix2 | CVE-2022-1586 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-posix2 | CVE-2022-1587 | LOW | 10.34-7 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| -| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
| -| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | 2:8.39-12ubuntu0.1 |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
| +| libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12ubuntu0.1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libperl5.30 | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| | libpython3.8 | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| | libpython3.8-minimal | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| | libpython3.8-stdlib | CVE-2015-20107 | LOW | 3.8.10-0ubuntu1~20.04.4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-20107
https://bugs.python.org/issue24778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107
https://github.com/python/cpython/issues/68966
https://github.com/python/cpython/pull/91542/commits/340251550897cb98ae83ad1040750d6300112e80
https://github.com/python/cpython/pull/91993
https://mail.python.org/archives/list/security-announce@python.org/thread/QDSXNCW77UGULFG2JMDFZQ7H4DIR32LA/
https://nvd.nist.gov/vuln/detail/CVE-2015-20107
| | libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| -| libsepol1 | CVE-2021-36084 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| -| libsepol1 | CVE-2021-36085 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| -| libsepol1 | CVE-2021-36086 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
| -| libsepol1 | CVE-2021-36087 | LOW | 3.0-1 | 3.0-1ubuntu0.1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| | libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| | libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.3 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| | libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.3 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| | libss2 | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| libtiff5 | CVE-2022-0865 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.2 | 4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
https://gitlab.com/libtiff/libtiff/-/issues/385
https://gitlab.com/libtiff/libtiff/-/merge_requests/306
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0865
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
| -| libtiff5 | CVE-2022-0891 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.2 | 4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
https://gitlab.com/libtiff/libtiff/-/issues/380
https://gitlab.com/libtiff/libtiff/-/issues/382
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/
https://nvd.nist.gov/vuln/detail/CVE-2022-0891
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
| -| libtiff5 | CVE-2022-1354 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| -| libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.2 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libtiff5 | CVE-2020-35522 | LOW | 4.1.0+git191117-2ubuntu0.20.04.2 | 4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2020-35522
https://bugzilla.redhat.com/show_bug.cgi?id=1932037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522
https://gitlab.com/libtiff/libtiff/-/merge_requests/165
https://linux.oracle.com/cve/CVE-2020-35522.html
https://linux.oracle.com/errata/ELSA-2021-4241.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
https://nvd.nist.gov/vuln/detail/CVE-2020-35522
https://security.gentoo.org/glsa/202104-06
https://security.netapp.com/advisory/ntap-20210521-0009/
https://ubuntu.com/security/notices/USN-5421-1
| -| libtiff5 | CVE-2022-0561 | LOW | 4.1.0+git191117-2ubuntu0.20.04.2 | 4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0561
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
| -| libtiff5 | CVE-2022-0562 | LOW | 4.1.0+git191117-2ubuntu0.20.04.2 | 4.1.0+git191117-2ubuntu0.20.04.3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-0562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562
https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
https://gitlab.com/libtiff/libtiff/-/issues/362
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://nvd.nist.gov/vuln/detail/CVE-2022-0562
https://security.netapp.com/advisory/ntap-20220318-0001/
https://ubuntu.com/security/notices/USN-5421-1
https://www.debian.org/security/2022/dsa-5108
| -| libtiff5 | CVE-2022-22844 | LOW | 4.1.0+git191117-2ubuntu0.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| +| libtiff5 | CVE-2022-1354 | MEDIUM | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354
https://gitlab.com/libtiff/libtiff/-/issues/319
| +| libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| +| libtiff5 | CVE-2022-22844 | LOW | 4.1.0+git191117-2ubuntu0.20.04.3 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-22844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844
https://gitlab.com/libtiff/libtiff/-/issues/355
https://gitlab.com/libtiff/libtiff/-/merge_requests/287
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22844
https://security.netapp.com/advisory/ntap-20220311-0002/
https://www.debian.org/security/2022/dsa-5108
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| -| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.10+dfsg-5ubuntu0.20.04.2 | 2.9.10+dfsg-5ubuntu0.20.04.3 |
Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://ubuntu.com/security/notices/USN-5422-1
https://www.debian.org/security/2022/dsa-5142
| | libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | |
Expand...https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
| -| linux-libc-dev | CVE-2022-1116 | HIGH | 5.4.0-110.124 | 5.4.0-113.127 |
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
https://access.redhat.com/security/cve/CVE-2022-1116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1116
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.4.189&id=1a623d361ffe5cecd4244a02f449528416360038
https://kernel.dance/#1a623d361ffe5cecd4244a02f449528416360038
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5442-2
| -| linux-libc-dev | CVE-2022-1966 | HIGH | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1966
https://bugzilla.redhat.com/show_bug.cgi?id=2092427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966
https://git.kernel.org/linus/520778042ccca019f3ffa136dd0ca565c486cedd
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO6Y3TC4WUUNKRP7OQA26OVTZTPCS6F2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIZTJOJCVVEJVOQSCHE6IJQKMPISHQ5L/
https://ubuntu.com/security/notices/USN-5465-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/31/1
| -| linux-libc-dev | CVE-2022-21499 | HIGH | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066
https://linux.oracle.com/cve/CVE-2022-21499.html
https://linux.oracle.com/errata/ELSA-2022-9427.html
https://ubuntu.com/security/notices/USN-5465-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/24/10
https://www.openwall.com/lists/oss-security/2022/05/24/7
| -| linux-libc-dev | CVE-2022-29581 | HIGH | 5.4.0-110.124 | 5.4.0-113.127 |
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
http://www.openwall.com/lists/oss-security/2022/05/18/2
https://access.redhat.com/security/cve/CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8
https://nvd.nist.gov/vuln/detail/CVE-2022-29581
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5442-2
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5443-2
https://ubuntu.com/security/notices/USN-5444-1
| -| linux-libc-dev | CVE-2013-7445 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| -| linux-libc-dev | CVE-2015-8553 | MEDIUM | 5.4.0-110.124 | |
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)
http://xenbits.xen.org/xsa/advisory-120.html
https://access.redhat.com/security/cve/CVE-2015-8553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
https://seclists.org/bugtraq/2019/Aug/18
https://www.debian.org/security/2019/dsa-4497
| -| linux-libc-dev | CVE-2016-8660 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://access.redhat.com/security/cve/CVE-2016-8660
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| -| linux-libc-dev | CVE-2018-17977 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| -| linux-libc-dev | CVE-2020-12362 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| -| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-24504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| -| linux-libc-dev | CVE-2020-27835 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| -| linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-36310
https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://www.debian.org/security/2022/dsa-5095
| -| linux-libc-dev | CVE-2021-20320 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
| -| linux-libc-dev | CVE-2021-33061 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061
https://security.netapp.com/advisory/ntap-20220210-0010/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
| -| linux-libc-dev | CVE-2021-3864 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| -| linux-libc-dev | CVE-2021-39800 | MEDIUM | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39800
https://source.android.com/security/bulletin/2022-04-01
| -| linux-libc-dev | CVE-2021-39801 | MEDIUM | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39801
https://source.android.com/security/bulletin/2022-04-01
| -| linux-libc-dev | CVE-2021-39802 | MEDIUM | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39802
https://source.android.com/security/bulletin/2022-04-01
| -| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4001
https://bugzilla.redhat.com/show_bug.cgi?id=2025645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
https://nvd.nist.gov/vuln/detail/CVE-2021-4001
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
| -| linux-libc-dev | CVE-2021-4148 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4148
https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-4148
| -| linux-libc-dev | CVE-2021-4150 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4150
https://bugzilla.redhat.com/show_bug.cgi?id=2025938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150
https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)
https://lkml.org/lkml/2021/10/18/485
https://lkml.org/lkml/2021/9/6/781
https://nvd.nist.gov/vuln/detail/CVE-2021-4150
| -| linux-libc-dev | CVE-2021-4159 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
| -| linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4197
https://bugzilla.redhat.com/show_bug.cgi?id=2035652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-4197.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4197
https://security.netapp.com/advisory/ntap-20220602-0006/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5467-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2021-4218 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218
| -| linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-44879
https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-44879
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
| -| linux-libc-dev | CVE-2022-0168 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://ubuntu.com/security/notices/USN-5469-1
| -| linux-libc-dev | CVE-2022-0382 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382
https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523
https://nvd.nist.gov/vuln/detail/CVE-2022-0382
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
| -| linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0400
https://bugzilla.redhat.com/show_bug.cgi?id=2040604
https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
| -| linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| -| linux-libc-dev | CVE-2022-0494 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
| -| linux-libc-dev | CVE-2022-0998 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/02/1
https://access.redhat.com/security/cve/CVE-2022-0998
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0998
https://security.netapp.com/advisory/ntap-20220513-0003/
| -| linux-libc-dev | CVE-2022-1011 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1011
https://bugzilla.redhat.com/show_bug.cgi?id=2064855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://linux.oracle.com/cve/CVE-2022-1011.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-1011
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5467-1
| -| linux-libc-dev | CVE-2022-1012 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
https://git.kernel.org/linus/b2d057560b8107c633b39aabe517ff9d93f285e3 (5.18-rc6)
https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/
https://ubuntu.com/security/notices/USN-5471-1
| -| linux-libc-dev | CVE-2022-1048 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| -| linux-libc-dev | CVE-2022-1158 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
https://linux.oracle.com/cve/CVE-2022-1158.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://seclists.org/oss-sec/2022/q2/22
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
| -| linux-libc-dev | CVE-2022-1195 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2056381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2022-1198 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
https://github.com/torvalds/linux/commit/efe4186e6a1b54bf38b9e05450d43b0da1fd7739
https://marc.info/?i=c012878.3292f.17fe9417790.Coremail.duoming@zju.edu.cn
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
| -| linux-libc-dev | CVE-2022-1263 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
https://ubuntu.com/security/notices/USN-5469-1
https://www.openwall.com/lists/oss-security/2022/04/07/1
https://www.spinics.net/lists/kvm/msg273052.html
| -| linux-libc-dev | CVE-2022-1353 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1353
https://bugzilla.redhat.com/show_bug.cgi?id=2066819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
https://git.kernel.org/linus/9a564bccb78a76740ea9d75a259942df8143d02c (5.17)
https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c
https://nvd.nist.gov/vuln/detail/CVE-2022-1353
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2022-1508 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
| -| linux-libc-dev | CVE-2022-1516 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7781607938c8
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
| -| linux-libc-dev | CVE-2022-1652 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1652
https://bugzilla.redhat.com/show_bug.cgi?id=1832397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
https://francozappa.github.io/about-bias/
https://kb.cert.org/vuls/id/647177/
https://nvd.nist.gov/vuln/detail/CVE-2022-1652
https://www.openwall.com/lists/oss-security/2022/05/10/1
https://www.openwall.com/lists/oss-security/2022/05/10/2
| -| linux-libc-dev | CVE-2022-1734 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/05/4
http://www.openwall.com/lists/oss-security/2022/06/09/1
https://access.redhat.com/security/cve/CVE-2022-1734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6)
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
https://nvd.nist.gov/vuln/detail/CVE-2022-1734
https://ubuntu.com/security/notices/USN-5471-1
| -| linux-libc-dev | CVE-2022-1786 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1786
https://bugzilla.redhat.com/show_bug.cgi?id=2087760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=29f077d070519a88a793fbc70f1e6484dc6d9e35
https://linux.oracle.com/cve/CVE-2022-1786.html
https://linux.oracle.com/errata/ELSA-2022-9426.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1786
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/24/4
| -| linux-libc-dev | CVE-2022-1836 | MEDIUM | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1836
https://git.kernel.org/linus/233087ca063686964a53c829d547c7571e3f67bf (5.18-rc5)
https://github.com/torvalds/linux/commit/233087ca063686964a53c829d547c7571e3f67bf
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://www.openwall.com/lists/oss-security/2022/04/28/1
| -| linux-libc-dev | CVE-2022-23036 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| -| linux-libc-dev | CVE-2022-23037 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| -| linux-libc-dev | CVE-2022-23038 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| -| linux-libc-dev | CVE-2022-23039 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| -| linux-libc-dev | CVE-2022-23040 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| -| linux-libc-dev | CVE-2022-23041 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| -| linux-libc-dev | CVE-2022-23042 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
https://xenbits.xen.org/xsa/advisory-396.html
https://xenbits.xenproject.org/xsa/advisory-396.txt
| -| linux-libc-dev | CVE-2022-24958 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-24958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
https://nvd.nist.gov/vuln/detail/CVE-2022-24958
https://security.netapp.com/advisory/ntap-20220225-0008/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
| -| linux-libc-dev | CVE-2022-26966 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-26966
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966
https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062
https://linux.oracle.com/cve/CVE-2022-26966.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://nvd.nist.gov/vuln/detail/CVE-2022-26966
https://security.netapp.com/advisory/ntap-20220419-0001/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5417-1
https://ubuntu.com/security/notices/USN-5418-1
https://ubuntu.com/security/notices/USN-5467-1
| -| linux-libc-dev | CVE-2022-28356 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...http://www.openwall.com/lists/oss-security/2022/04/06/1
https://access.redhat.com/security/cve/CVE-2022-28356
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
https://git.kernel.org/linus/764f4eb6846f5475f1244767d24d25dd86528a4a
https://github.com/torvalds/linux/commit/764f4eb6846f5475f1244767d24d25dd86528a4a
https://nvd.nist.gov/vuln/detail/CVE-2022-28356
https://security.netapp.com/advisory/ntap-20220506-0006/
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/04/06/1
| -| linux-libc-dev | CVE-2022-28389 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
https://git.kernel.org/linus/04c9b00ba83594a29813d6b1fb8fdc93a3915174 (5.18-rc1)
https://github.com/torvalds/linux/commit/04c9b00ba83594a29813d6b1fb8fdc93a3915174
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28389
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2022-28390 | MEDIUM | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1)
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
| -| linux-libc-dev | CVE-2022-28893 | MEDIUM | 5.4.0-110.124 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/security/cve/CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://security.netapp.com/advisory/ntap-20220526-0002/
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
| -| linux-libc-dev | CVE-2022-30594 | MEDIUM | 5.4.0-110.124 | 5.4.0-113.127 |
Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1)
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5442-2
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5443-2
https://ubuntu.com/security/notices/USN-5465-1
| -| linux-libc-dev | CVE-2017-0537 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/96831
http://www.securitytracker.com/id/1037968
https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537
https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t
https://source.android.com/security/bulletin/2017-01-01.html
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
| -| linux-libc-dev | CVE-2017-13165 | LOW | 5.4.0-110.124 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165
https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a
https://source.android.com/security/bulletin/pixel/2017-12-01
| -| linux-libc-dev | CVE-2017-13693 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| -| linux-libc-dev | CVE-2018-1121 | LOW | 5.4.0-110.124 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| -| linux-libc-dev | CVE-2018-12928 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104593
https://access.redhat.com/security/cve/CVE-2018-12928
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| -| linux-libc-dev | CVE-2018-12929 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12929
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| -| linux-libc-dev | CVE-2018-12930 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12930
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| -| linux-libc-dev | CVE-2018-12931 | LOW | 5.4.0-110.124 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12931
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| -| linux-libc-dev | CVE-2019-14899 | LOW | 5.4.0-110.124 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://seclists.org/fulldisclosure/2020/Jul/25
http://seclists.org/fulldisclosure/2020/Nov/20
http://www.openwall.com/lists/oss-security/2020/08/13/2
http://www.openwall.com/lists/oss-security/2020/10/07/3
https://access.redhat.com/security/cve/CVE-2019-14899
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899
https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://support.apple.com/kb/HT211290
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://www.openwall.com/lists/oss-security/2019/12/05/1
| -| linux-libc-dev | CVE-2019-15213 | LOW | 5.4.0-110.124 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| -| linux-libc-dev | CVE-2019-16230 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| -| linux-libc-dev | CVE-2019-19378 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| -| linux-libc-dev | CVE-2019-19814 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| -| linux-libc-dev | CVE-2020-11725 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://nvd.nist.gov/vuln/detail/CVE-2020-11725
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| -| linux-libc-dev | CVE-2020-12363 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| -| linux-libc-dev | CVE-2020-12364 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| -| linux-libc-dev | CVE-2020-14304 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| -| linux-libc-dev | CVE-2020-35501 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
| -| linux-libc-dev | CVE-2021-26934 | LOW | 5.4.0-110.124 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://nvd.nist.gov/vuln/detail/CVE-2021-26934
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| -| linux-libc-dev | CVE-2021-32078 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-32078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://nvd.nist.gov/vuln/detail/CVE-2021-32078
https://security.netapp.com/advisory/ntap-20210813-0002/
| -| linux-libc-dev | CVE-2021-34981 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
| -| linux-libc-dev | CVE-2021-3669 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| -| linux-libc-dev | CVE-2021-3772 | LOW | 5.4.0-110.124 | 5.4.0-117.132 |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://linux.oracle.com/cve/CVE-2021-3772.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3772
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://www.debian.org/security/2022/dsa-5096
| -| linux-libc-dev | CVE-2022-0854 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
| -| linux-libc-dev | CVE-2022-1729 | LOW | 5.4.0-110.124 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
https://github.com/torvalds/linux/commit/3ac6487e584a1eb54071dbe1212e05b884136704
https://linux.oracle.com/cve/CVE-2022-1729.html
https://linux.oracle.com/errata/ELSA-2022-9413.html
https://lore.kernel.org/all/20220520183806.GV2578@worktop.programming.kicks-ass.net/T/#u
https://www.openwall.com/lists/oss-security/2022/05/20/2
| -| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| linux-libc-dev | CVE-2013-7445 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-7445
https://bugzilla.kernel.org/show_bug.cgi?id=60533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
| +| linux-libc-dev | CVE-2015-8553 | MEDIUM | 5.4.0-117.132 | |
Expand...http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1930758 (regression mention)
http://xenbits.xen.org/xsa/advisory-120.html
https://access.redhat.com/security/cve/CVE-2015-8553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553
https://seclists.org/bugtraq/2019/Aug/18
https://www.debian.org/security/2019/dsa-4497
| +| linux-libc-dev | CVE-2016-8660 | MEDIUM | 5.4.0-117.132 | |
Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8
http://www.securityfocus.com/bid/93558
https://access.redhat.com/security/cve/CVE-2016-8660
https://bugzilla.redhat.com/show_bug.cgi?id=1384851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
https://marc.info/?l=linux-xfs&m=149498118228320&w=2
| +| linux-libc-dev | CVE-2018-17977 | MEDIUM | 5.4.0-117.132 | |
Expand...http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
| +| linux-libc-dev | CVE-2020-12362 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362
https://linux.oracle.com/cve/CVE-2020-12362.html
https://linux.oracle.com/errata/ELSA-2021-9434.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-24504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
| +| linux-libc-dev | CVE-2020-27835 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://ubuntu.com/security/notices/USN-4751-1
| +| linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-36310
https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
https://linux.oracle.com/cve/CVE-2020-36310.html
https://linux.oracle.com/errata/ELSA-2021-9307.html
https://www.debian.org/security/2022/dsa-5095
| +| linux-libc-dev | CVE-2021-20320 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
| +| linux-libc-dev | CVE-2021-33061 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-33061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33061
https://security.netapp.com/advisory/ntap-20220210-0010/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html
| +| linux-libc-dev | CVE-2021-3864 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864
https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
https://www.openwall.com/lists/oss-security/2021/10/20/2
| +| linux-libc-dev | CVE-2021-39800 | MEDIUM | 5.4.0-117.132 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39800
https://source.android.com/security/bulletin/2022-04-01
| +| linux-libc-dev | CVE-2021-39801 | MEDIUM | 5.4.0-117.132 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39801
https://source.android.com/security/bulletin/2022-04-01
| +| linux-libc-dev | CVE-2021-39802 | MEDIUM | 5.4.0-117.132 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39802
https://source.android.com/security/bulletin/2022-04-01
| +| linux-libc-dev | CVE-2021-4001 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4001
https://bugzilla.redhat.com/show_bug.cgi?id=2025645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001
https://git.kernel.org/linus/353050be4c19e102178ccc05988101887c25ae53
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
https://nvd.nist.gov/vuln/detail/CVE-2021-4001
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
| +| linux-libc-dev | CVE-2021-4148 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4148
https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-4148
| +| linux-libc-dev | CVE-2021-4150 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4150
https://bugzilla.redhat.com/show_bug.cgi?id=2025938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150
https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)
https://lkml.org/lkml/2021/10/18/485
https://lkml.org/lkml/2021/9/6/781
https://nvd.nist.gov/vuln/detail/CVE-2021-4150
| +| linux-libc-dev | CVE-2021-4159 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
| +| linux-libc-dev | CVE-2021-4218 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218
| +| linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-44879
https://bugzilla.kernel.org/show_bug.cgi?id=215231
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
https://lkml.org/lkml/2022/1/24/4067
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-44879
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.openwall.com/lists/oss-security/2022/02/12/1
| +| linux-libc-dev | CVE-2022-0168 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://ubuntu.com/security/notices/USN-5469-1
| +| linux-libc-dev | CVE-2022-0382 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382
https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523
https://nvd.nist.gov/vuln/detail/CVE-2022-0382
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
| +| linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0400
https://bugzilla.redhat.com/show_bug.cgi?id=2040604
https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
| +| linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
| +| linux-libc-dev | CVE-2022-0494 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
| +| linux-libc-dev | CVE-2022-0998 | MEDIUM | 5.4.0-117.132 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/02/1
https://access.redhat.com/security/cve/CVE-2022-0998
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0998
https://security.netapp.com/advisory/ntap-20220513-0003/
| +| linux-libc-dev | CVE-2022-1012 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
https://git.kernel.org/linus/b2d057560b8107c633b39aabe517ff9d93f285e3 (5.18-rc6)
https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/
https://ubuntu.com/security/notices/USN-5471-1
| +| linux-libc-dev | CVE-2022-1048 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1048
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://linux.oracle.com/cve/CVE-2022-1048.html
https://linux.oracle.com/errata/ELSA-2022-9480.html
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
https://nvd.nist.gov/vuln/detail/CVE-2022-1048
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
https://www.openwall.com/lists/oss-security/2022/03/28/4
| +| linux-libc-dev | CVE-2022-1195 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2056381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
https://ubuntu.com/security/notices/USN-5469-1
https://www.debian.org/security/2022/dsa-5127
| +| linux-libc-dev | CVE-2022-1263 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
https://ubuntu.com/security/notices/USN-5469-1
https://www.openwall.com/lists/oss-security/2022/04/07/1
https://www.spinics.net/lists/kvm/msg273052.html
| +| linux-libc-dev | CVE-2022-1508 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
| +| linux-libc-dev | CVE-2022-1652 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1652
https://bugzilla.redhat.com/show_bug.cgi?id=1832397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
https://francozappa.github.io/about-bias/
https://kb.cert.org/vuls/id/647177/
https://nvd.nist.gov/vuln/detail/CVE-2022-1652
https://www.openwall.com/lists/oss-security/2022/05/10/1
https://www.openwall.com/lists/oss-security/2022/05/10/2
| +| linux-libc-dev | CVE-2022-1734 | MEDIUM | 5.4.0-117.132 | |
Expand...http://www.openwall.com/lists/oss-security/2022/06/05/4
http://www.openwall.com/lists/oss-security/2022/06/09/1
https://access.redhat.com/security/cve/CVE-2022-1734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6)
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
https://nvd.nist.gov/vuln/detail/CVE-2022-1734
https://ubuntu.com/security/notices/USN-5471-1
| +| linux-libc-dev | CVE-2022-1786 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1786
https://bugzilla.redhat.com/show_bug.cgi?id=2087760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=29f077d070519a88a793fbc70f1e6484dc6d9e35
https://linux.oracle.com/cve/CVE-2022-1786.html
https://linux.oracle.com/errata/ELSA-2022-9426.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1786
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/24/4
| +| linux-libc-dev | CVE-2022-1836 | MEDIUM | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1836
https://git.kernel.org/linus/233087ca063686964a53c829d547c7571e3f67bf (5.18-rc5)
https://github.com/torvalds/linux/commit/233087ca063686964a53c829d547c7571e3f67bf
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://www.openwall.com/lists/oss-security/2022/04/28/1
| +| linux-libc-dev | CVE-2022-28893 | MEDIUM | 5.4.0-117.132 | |
Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/security/cve/CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://security.netapp.com/advisory/ntap-20220526-0002/
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
| +| linux-libc-dev | CVE-2017-0537 | LOW | 5.4.0-117.132 | |
Expand...http://www.securityfocus.com/bid/96831
http://www.securitytracker.com/id/1037968
https://android.googlesource.com/kernel/tegra.git/+/389b185cb2f17fff994dbdf8d4bac003d4b2b6b3%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0537
https://lore.kernel.org/lkml/1484647168-30135-1-git-send-email-jilin@nvidia.com/#t
https://source.android.com/security/bulletin/2017-01-01.html
https://source.android.com/security/bulletin/2017-03-01
https://source.android.com/security/bulletin/2017-03-01.html
| +| linux-libc-dev | CVE-2017-13165 | LOW | 5.4.0-117.132 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13165
https://github.com/aosp-mirror/platform_system_core/commit/15ffc53f6d57a46e3041453865311035a18e047a
https://source.android.com/security/bulletin/pixel/2017-12-01
| +| linux-libc-dev | CVE-2017-13693 | LOW | 5.4.0-117.132 | |
Expand...http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://patchwork.kernel.org/patch/9919053/
| +| linux-libc-dev | CVE-2018-1121 | LOW | 5.4.0-117.132 | |
Expand...http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
| +| linux-libc-dev | CVE-2018-12928 | LOW | 5.4.0-117.132 | |
Expand...http://www.securityfocus.com/bid/104593
https://access.redhat.com/security/cve/CVE-2018-12928
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
| +| linux-libc-dev | CVE-2018-12929 | LOW | 5.4.0-117.132 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12929
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12929
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2018-12930 | LOW | 5.4.0-117.132 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12930
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2018-12931 | LOW | 5.4.0-117.132 | |
Expand...http://www.securityfocus.com/bid/104588
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/security/cve/CVE-2018-12931
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12931
https://marc.info/?l=linux-ntfs-dev&m=152413769810234&w=2
| +| linux-libc-dev | CVE-2019-14899 | LOW | 5.4.0-117.132 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://seclists.org/fulldisclosure/2020/Jul/25
http://seclists.org/fulldisclosure/2020/Nov/20
http://www.openwall.com/lists/oss-security/2020/08/13/2
http://www.openwall.com/lists/oss-security/2020/10/07/3
https://access.redhat.com/security/cve/CVE-2019-14899
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14899
https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://support.apple.com/kb/HT211290
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://www.openwall.com/lists/oss-security/2019/12/05/1
| +| linux-libc-dev | CVE-2019-15213 | LOW | 5.4.0-117.132 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
| +| linux-libc-dev | CVE-2019-16230 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
https://lkml.org/lkml/2019/9/9/487
https://security.netapp.com/advisory/ntap-20191004-0001/
| +| linux-libc-dev | CVE-2019-19378 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2019-19814 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
https://security.netapp.com/advisory/ntap-20200103-0001/
| +| linux-libc-dev | CVE-2020-11725 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-11725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725
https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
https://nvd.nist.gov/vuln/detail/CVE-2020-11725
https://twitter.com/yabbadabbadrew/status/1248632267028582400
| +| linux-libc-dev | CVE-2020-12363 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363
https://linux.oracle.com/cve/CVE-2020-12363.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-12364 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-12364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364
https://linux.oracle.com/cve/CVE-2020-12364.html
https://linux.oracle.com/errata/ELSA-2021-2314.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
| +| linux-libc-dev | CVE-2020-14304 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
| +| linux-libc-dev | CVE-2020-35501 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
| +| linux-libc-dev | CVE-2021-26934 | LOW | 5.4.0-117.132 | |
Expand...http://xenbits.xen.org/xsa/advisory-363.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
https://nvd.nist.gov/vuln/detail/CVE-2021-26934
https://security.netapp.com/advisory/ntap-20210326-0001/
https://www.openwall.com/lists/oss-security/2021/02/16/2
https://xenbits.xen.org/xsa/advisory-363.html
| +| linux-libc-dev | CVE-2021-32078 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-32078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
https://kirtikumarar.com/CVE-2021-32078.txt
https://nvd.nist.gov/vuln/detail/CVE-2021-32078
https://security.netapp.com/advisory/ntap-20210813-0002/
| +| linux-libc-dev | CVE-2021-34981 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
| +| linux-libc-dev | CVE-2021-3669 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
| +| linux-libc-dev | CVE-2022-0854 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
https://www.debian.org/security/2022/dsa-5161
| +| linux-libc-dev | CVE-2022-1729 | LOW | 5.4.0-117.132 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
https://github.com/torvalds/linux/commit/3ac6487e584a1eb54071dbe1212e05b884136704
https://linux.oracle.com/cve/CVE-2022-1729.html
https://linux.oracle.com/errata/ELSA-2022-9413.html
https://lore.kernel.org/all/20220520183806.GV2578@worktop.programming.kicks-ass.net/T/#u
https://www.openwall.com/lists/oss-security/2022/05/20/2
| +| login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | logsave | CVE-2022-1304 | MEDIUM | 1.45.5-2ubuntu1 | 1.45.5-2ubuntu1.1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| | mysql-client | CVE-2021-46322 | MEDIUM | 8.0.29-0ubuntu0.20.04.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322
https://github.com/svaarala/duktape/issues/2448
| | mysql-client-8.0 | CVE-2021-46322 | MEDIUM | 8.0.29-0ubuntu0.20.04.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322
https://github.com/svaarala/duktape/issues/2448
| | mysql-client-core-8.0 | CVE-2021-46322 | MEDIUM | 8.0.29-0ubuntu0.20.04.3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322
https://github.com/svaarala/duktape/issues/2448
| -| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| +| ncurses-base | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.2-0ubuntu2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | LOW | 6.2-0ubuntu2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.2 | |
Expand...https://access.redhat.com/security/cve/CVE-2013-4235
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | patch | CVE-2018-6952 | LOW | 2.7.6-6 | |
Expand...http://www.securityfocus.com/bid/103047
https://access.redhat.com/errata/RHSA-2019:2033
https://access.redhat.com/security/cve/CVE-2018-6952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
https://linux.oracle.com/cve/CVE-2018-6952.html
https://linux.oracle.com/errata/ELSA-2019-2033.html
https://nvd.nist.gov/vuln/detail/CVE-2018-6952
https://savannah.gnu.org/bugs/index.php?53133
https://security.gentoo.org/glsa/201904-17
| | patch | CVE-2021-45261 | LOW | 2.7.6-6 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-45261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261
https://savannah.gnu.org/bugs/?61685
| | perl | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| @@ -942,6 +902,6 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| guzzlehttp/guzzle | CVE-2022-29248 | HIGH | 7.4.2 | 7.4.3, 6.5.6 |
Expand...https://github.com/advisories/GHSA-cwmx-hcrq-mhc3
https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab
https://github.com/guzzle/guzzle/pull/3018
https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
https://nvd.nist.gov/vuln/detail/CVE-2022-29248
https://www.drupal.org/sa-core-2022-010
| -| guzzlehttp/guzzle | CVE-2022-31042 | HIGH | 7.4.2 | 7.4.4, 6.5.7 |
Expand...https://github.com/advisories/GHSA-f2wf-25xc-69c9
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| -| guzzlehttp/guzzle | CVE-2022-31043 | HIGH | 7.4.2 | 7.4.4, 6.5.7 |
Expand...https://github.com/advisories/GHSA-w248-ffj2-4v5q
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| +| guzzlehttp/guzzle | CVE-2022-29248 | HIGH | 7.4.2 | 6.5.6, 7.4.3 |
Expand...https://github.com/advisories/GHSA-cwmx-hcrq-mhc3
https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab
https://github.com/guzzle/guzzle/pull/3018
https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
https://nvd.nist.gov/vuln/detail/CVE-2022-29248
https://www.drupal.org/sa-core-2022-010
| +| guzzlehttp/guzzle | CVE-2022-31042 | HIGH | 7.4.2 | 6.5.7, 7.4.4 |
Expand...https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31042.yaml
https://github.com/advisories/GHSA-f2wf-25xc-69c9
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
https://nvd.nist.gov/vuln/detail/CVE-2022-31042
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| +| guzzlehttp/guzzle | CVE-2022-31043 | HIGH | 7.4.2 | 7.4.4, 6.5.7 |
Expand...https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31043.yaml
https://github.com/advisories/GHSA-w248-ffj2-4v5q
https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
https://nvd.nist.gov/vuln/detail/CVE-2022-31043
https://www.drupal.org/sa-core-2022-011
https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
| diff --git a/stable/snipe-it/4.0.4/templates/_secrets.tpl b/stable/snipe-it/4.0.5/templates/_secrets.tpl similarity index 100% rename from stable/snipe-it/4.0.4/templates/_secrets.tpl rename to stable/snipe-it/4.0.5/templates/_secrets.tpl diff --git a/stable/snipe-it/4.0.4/templates/common.yaml b/stable/snipe-it/4.0.5/templates/common.yaml similarity index 100% rename from stable/snipe-it/4.0.4/templates/common.yaml rename to stable/snipe-it/4.0.5/templates/common.yaml diff --git a/stable/storj-node/2.0.4/SKIPINSTALL b/stable/snipe-it/4.0.5/values.yaml similarity index 100% rename from stable/storj-node/2.0.4/SKIPINSTALL rename to stable/snipe-it/4.0.5/values.yaml diff --git a/stable/storj-node/2.0.4/Chart.lock b/stable/storj-node/2.0.4/Chart.lock deleted file mode 100644 index 59f512169e6..00000000000 --- a/stable/storj-node/2.0.4/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:47:54.175053839Z" diff --git a/stable/storj-node/2.0.4/CHANGELOG.md b/stable/storj-node/2.0.5/CHANGELOG.md similarity index 90% rename from stable/storj-node/2.0.4/CHANGELOG.md rename to stable/storj-node/2.0.5/CHANGELOG.md index 44a233f937e..b236b3a3e89 100644 --- a/stable/storj-node/2.0.4/CHANGELOG.md +++ b/stable/storj-node/2.0.5/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [storj-node-2.0.5](https://github.com/truecharts/apps/compare/storj-node-2.0.4...storj-node-2.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [storj-node-2.0.4](https://github.com/truecharts/apps/compare/storj-node-2.0.3...storj-node-2.0.4) (2022-06-14) @@ -88,12 +97,3 @@ - -### [storj-node-1.0.26](https://github.com/truecharts/apps/compare/storj-node-1.0.25...storj-node-1.0.26) (2022-05-26) - -#### Chore - -* update helm general non-major helm releases ([#2759](https://github.com/truecharts/apps/issues/2759)) - - - diff --git a/stable/storj-node/2.0.5/CONFIG.md b/stable/storj-node/2.0.5/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/storj-node/2.0.5/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/storj-node/2.0.5/Chart.lock b/stable/storj-node/2.0.5/Chart.lock new file mode 100644 index 00000000000..378df76ba6a --- /dev/null +++ b/stable/storj-node/2.0.5/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:35:12.531318822Z" diff --git a/stable/storj-node/2.0.4/Chart.yaml b/stable/storj-node/2.0.5/Chart.yaml similarity index 95% rename from stable/storj-node/2.0.4/Chart.yaml rename to stable/storj-node/2.0.5/Chart.yaml index 9877cfd91cc..99c8f2b0a1a 100644 --- a/stable/storj-node/2.0.4/Chart.yaml +++ b/stable/storj-node/2.0.5/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "1.56.4" +appVersion: "1.57.1" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -20,7 +20,7 @@ sources: - https://github.com/storj/storj - https://docs.storj.io/node/ - https://hub.docker.com/r/storjlabs/storagenode -version: 2.0.4 +version: 2.0.5 annotations: truecharts.org/catagories: | - media diff --git a/stable/storj-node/2.0.4/README.md b/stable/storj-node/2.0.5/README.md similarity index 100% rename from stable/storj-node/2.0.4/README.md rename to stable/storj-node/2.0.5/README.md diff --git a/stable/storj-node/2.0.5/SKIPINSTALL b/stable/storj-node/2.0.5/SKIPINSTALL new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/storj-node/2.0.4/app-readme.md b/stable/storj-node/2.0.5/app-readme.md similarity index 100% rename from stable/storj-node/2.0.4/app-readme.md rename to stable/storj-node/2.0.5/app-readme.md diff --git a/stable/storj-node/2.0.5/charts/common-10.0.10.tgz b/stable/storj-node/2.0.5/charts/common-10.0.10.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b39f3b3a8f32cdc206c3bbba091c49a15329f972 GIT binary patch literal 46486 zcmV)>K!d*@iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{cy>x9z#s)0XXMCv(^BB;7uphmY-~@9yjz z2O=Q}V~S)0pd3v)-~D&+BtU`^Q;g!A}M zcmMQyz25%bp7^)d>y`iQ?e7l$)ZZHn2ff|hUa$YBUVpGR?EMM!?g5v|lT!xCpL(}$ ztK7NoluqP&C$RYfRhXMXL=|GgtW-nXdl$ z*XR9Cf4|df_kL{6Ax;>?2_ga*nnN6q08S?9e-(f`DVeqaNFeX8MF0SD5*O%~D#+pr z1Gdc2NTb(UXk7ZePOsDNwH{{t)%;(;I7jrJ1i;Gq-|z43?j4lp|3UxYasEHV^8~cp z;9Z8252tSd%}|IZI0RvuOz<=(kk9qj6YyUVn!r3}yzn_fV2tAQx|L=qS!Bt{98S@w z1%QBcE?_JHn<1bIfH1}=VF2@jEdU70Qi@qhmLo8og`|U1TRx~-ZCR@+T)-fokPJ?> zVQ+VTIOwBswANeDM6HXs3oBNh6(yPha}pR z>erZ{DX&;h_X2i9k{g%}pxK08^gF%Ipf~9Ep7r-My$8Miv%SOUU~h2P+Z*=#!~XuW z-a)wA?}y{TV2@LIZx=?peKeRva1tFJ^arpP!QChvKZA#ZCOB+F>Wrjw264P8rFFe} zLL0~p>8#7IhviUt&>41mn!E=CGzkx)gZ+MV2zU4381C;6hPwy7sNd@!^w4hDkI-Z? z8KZ+f97KEl5I!3m3_~;+JnIdfd55^v_D0lA5Tmm+Wt&o0*Q=+lf!vU~y8L=r^}=G% zA5R9m`;as7;j?f!9uJ3m2jkv8I_w?pjt3C!!?3>_A;j5rFh-Le?DzU`+#62%z1_nG zZP!!xD87bEs^}V~5u%7J5ZRQnMa_EJ@-l4&z9D(7DvcmIEWFp*D_FR{J3c( zgJ-+r$=+~qa2TOyhbSB$?xOLqH`$F2_a_t78y+5v_a<->?MLBY_$=DpKY)8)7OpnG z5f{Ta!wK4y(y~@Pm5(IUh6I+-*1>Vey4&dwI|IYK&rr0xci4kHg!XnP2XL}~*q@+i z80}5ML4P>x@5Aw=AMW)LjL`nG-NW%5c(}W^>CMD$O4*bk`upaB*VJ4g zdJE`Hg|Dg61fHwr_By)-`wrp3!Tu0MFd8519>U@N!SG=CtQQ^b?e6st4)^=f;9!4n z7*2-!6EqnQhG@5Uc+i^+QE%^Hf8aGJD$Q?1>NzABM&nKCtg6)$S;K8eVO4xBB$u|m z&Oyf*4+oQj@v}p8*pK$2@$j&BINlw?{$RMjxBu+muzwhZ@L)1H-0L0g_j{A!AsS5J z-tPW*98P+ZF&eIKdo#kO$uzwIVP&-ygjH~x5>^&p3&|nuu+!^2Ge&U#V0aj!XfT9u zaCk7-h2uRGKAVi6!Qlbw?~mbd{49cl-Di7IICzG*8GHzz4F|)+-QnJ(zrN|Fbe+cO z7{&!v5Cbp)=>idgBP1LO(j-9>{0XEJ@oSRDF<(5ZCHFg3+JVB$p@dUmF2~MyW zCtv`0Yr-fJ4weP9eJD2$B6LR z6(NcVia?e|R0^UPhmejye+2{O*_6Nt0m=wuXu1?dU!?@RFv!py-Ul4Xo=Dz0Lm@$s zA+V*S<~D#y1kTbp#>w=37D1-?lEXSzy*Wo-VDFL_C`JrbK@{L6uor?991OtIBqe<6 zV9LK~{Q1-(HVFR0>V84vQcH9A3FHY}KpgX_Cu&*0HvvO)GL-yX9V6~9Jg8-WZ~>2Ng19jl_F_5VjvR@E`gwPY&HPi9-YgUTk=C$TTM}d zq}8N#x&k0AsyWPT1vY^(H8Rgo^%Sxh$SEKH8P}ozg~B`^rWoU(KdPEJK#UUmff&jy|T{$Xc-zq9WJ3GS7r`W3zZj$Au`7aqTqUlIH8M~B&Q6o3P_$%aE;jvTwMIO=B7@Iv886I z8-k-O!bt&8{B%Kz`3rtY3H~RC6ob<=0!KMZX$WIPN=t>mM3@R#e{Ic7mD4mTD)9L; zhd7aXpfWKOKUx~)3MY}6T98bI*5^g+HaRpwVE###`V}XUrD%lNtY)VyfFjq%YXH-N zH^&K{=W_t(X`V0+S(z6q0ZhSM8e%X3{SvetFz0R3 zTozy;P2y#xlz;)r6^a0)8ZX(9`k~cVVMxhUyfy2g1_~6N0G*|I9PuTYv{fVD{3}3O zl9P`ij3TYHOMpd{%IeO*xtJkm`jydQDPJO5bWBnvtO0KQDyy0g5y{aGfD#m@TI-@n zX*zo?Z5E*dsFd14;4%>e$8k;>B4=qVEp6-fPdJHiGOcATGKOJehT?^9%SIeV9rFnI zo3qSIG4PZxfR)IWXg46sO1|N$@2IMeEij^NSp2qiq65a&perC$wEPCx=uVYks`r~C zXH%&PZ#AlCxfl|EhY9~!s`LU)gtFIcO7rnQP{_&>Ddv89Yi36=^P@<^p?c0& z`=`O-B#iS&F%KN43nO33f?BQsC0xq_I#!NHv7L0Ck}J7vGFHFv6aqdgI;*zaikhC8 zS;y>7y%l^dt!VsDRV_;+vyRhCaziR^z{{8%Kvki(WEKU?sy(vE&LwP006}w3Lq!C( z%ncbVcCWpVESr2bVe+VZ!Y@uKR5@M8r*T?0tl@-YrEk~QT!<-uuOOQB#b#okjT z2O~^S$l@h{jKOfGtWT~^)M5@N43P;8#n_(42vRdYLS& z>H7wX^}_;_G!f>yS-Wt`r-*VUnUHG(w^B->j^m826~bH1pKrOPLIyde|s?k zKYsoUI%h~QMTg5N@a4;otta5v6ltm6%a!&UnEi^DXJ}&HYvnJ$x92cxo0Xe*uF!JC z|D#{OsDKu$x>qEfTR2R97+%~Jri~n(2)?|6LqJ*DLNRJXq z76O00iZ#Ttu&*OiTXm*V)b3-+I2R0)D)nImz=Wi8;mOimWbIRk8gHeGSotv8MIlFo zb5Zm{N^oUOO8(@~$A~lX3ggzXNnyxx7=s8h$OY0EfjEVcFw%^jD_}zkC?hzTzJLrW z7{@Tt>uSKVSR0&L?Q@{EhLb*+jNp`Dwgh1esdS(fu0F=m7V~E;_n>GvLs8Bb*t*^^ zuO{_1SK~{{(7c_b5o(773uld9u}jyY+}c|@ejo!?jAP6EG+^QN)ioqhJA%m+ku<06 z0+BlC=o4S;VJ2j!Fu*AiQl<3-WUfq?YGF(eyrRNu0;V~Z)&u0Erun>ZDRP0YK~g?b z^bfrt{B4F3?KVp(dn>iMWhXDwT&yLcgldJFf{)6WdBug=Z^?B437P!gq#Dj^Hz za0v*aX}mxnp>djC zQI5n?pTi<34MT}b(TdRbqJvU5@~Lf;dHE)&!r_zyn?qVnQx$@+Qa+>H~iWfhVG|%*#iTji0Sr#MC3NRKQG-Ii9$1^Sk z^@MzvoTVvygXtWyaJCuN!kt)bkz%C05}ESrUG$OEi8?QGbXD?CB_pJF2fkrb<7m7)Zc|LIxRQ!HI8G>Z6r^2 zxO#;NzzJri#14Rf&kjC+@f-oj08S`_aV&fuotFA#c6;a@w}$vy1w~kd2jp@$QgOOi z*mYWJpV*6mjwFG}QnXYQ602B_12=@Y7$-}B8Jg1$c*&b|N^6JR3@#ABT$*1e+jGg#gS%e*;y6BQQjDL zsAf5OrEMCckf8{C)RYt>u_MuxZOqa*q8g%#`_j_L3%ibUfWUmDOe+Bi#xGC|m**%< zlZcK$zo))th+v^)OYgaaOmk*F4AuJy#Bom0#f%`z5$0ctIE@J68}YiCW`1TjpYMg+ z4fIEL--O*=vfVMi`+ znFs3qlPA*EK1VR205dS-b~2d5Phwj?oq*w=cYDwK!yaE1^16bJIF=yKz!*(Z!fiP* zE2w`))lZ!LUaKW7R_Mg{xl0c*wvd7A84hQ1yBEj8=TN+H7b8DXV1Wg5L@AsivmUr6 zm@$-ebaT>9TxBK_B%F02vOcz9hP!;#AEz*C6GYRTgot*z3AyNZpO^(vyT8rXR|<<$ z&Voi@oFowr`66SMUN`SZv7w)(SU@X^lD(uuO;rLRL;yI2X(Yu;Ia+ds2gISC9 z279oohDW6}4Ar@#7@al2IX4KgaAGQ@Up${o@Fxjg>oz%bm^y@TPjq-d8ZD%DlBFgv zA;6W$0z34ED_-^0Y%HJSc^0Fs*C~v~FosEp$o3B4KYvm`ceFeDu$>d^kOrrK^cyEH2lGY-K4h=p9LG!TAhtl10^o24CcG%tJ6(nD7S62#jg!;G-VXoozTE`Y zdmNromwx94!)<8;F}^oe1$?M1RnUl;w1HYEg|&(y)AFT8Gpx}Lf);C3g9Yb?+Cfsh zRyEY92ZuQXh(w%QD(a+!jY?&?yyg91X_&?x>)Uyr2^iKHqK|xi^l?Z2d(Qv3I6hSd z;QJS+AMNULDaAjjMO6l`69Df|em)UwPP2BVvC zVh)H&-?gwMj)M7?eNkcGtqu)hiT5mhH0JSM~+nrCd$;ly$@C4q$Vy0rKc_9kc{)yFwuQbb_PaTLYZkRW>mU*S(Edc(gU@u@-?F`LqftS!rEsm2II z6MSWVxjLjW%p!v!(qaD`VRITxL6*^8Vl%Zcu?q^=FgcZAmLa~D=kWP&)pXI8iJmQL z%8#nO;xM2YNhjFA;9AVYEgc83?V!VPOmha%r!1u=@=>*plBk_irH3bF+A0~==CdCs z?J=Y{bmOLV+y4?&pWAGug9Erp@(gqCcYGt zRHFV%O2t`Efs`9xpf$7zFSjf%c}P}h__hj1?Zjry>P0GpY*rw}0TlKx|5U7a3d~L+ zn{_}llz`c_=sNGD_gLtPh}+BDq_pyXg1|MKJ0^McFZyqp>t-x$kk~fA`DN&&VUgzKpdhyMua*0 zelGi)g9AP$E*rQR=M~C0g;$u~?^R@=I*|txTdeRtAQ?!<)ttnh!x85}xsrW<{u79h zJi2i!JKn;!YRk(OYEAiOJ-sjFO09b_G_m;&RvK2>n=UmZh#yt7e*Id*WHR9F6`Jtf zHR}z7pl`)tYRdz5r6Zs}7R2TU6Ot9&vWeVs!f9ct`#D%jpj1h#i3D z8C$-GXBcl}LxDp)F&m5lgE<9v?vip|}O*95kYgnaD&g`;zsPA=IDUCQcz z{kWrws$&|wMiJPu(AeGqN$OM;MyLot5*xvMvdmKBpYWkC8?j-?#Z%knZ55An4P~MQf^u;( z37}7y3YH9Gi03=SD60S@^PSH$XH8=5DCt7S9ENCondYP|Kw3DwS1!XaP5z-TSr9IZ zj}Cy39V?3k1T-JFWjI$tH6NOlKvc|7?SmJQ`ss6y zd@5y-z&T=w=v5eJMJH9(4j+j$L&?jZ&h@z`ZsqZRE46=8Vd4$6*EuH?G()uBdv@pepGbcENwoe!QtTs`AjtTrPgNosMUNdJ zSVO4u8qs1W6aQ0+jky2^RBzM}6jMXxA_PxBUrvzkf;AS9#OajYkT({Pbb0kh?s#DC zkg^)hvs7Geq-e8pqM_@F@Y#XhIoExadMvPdt9{B^F^?P9wJ zJSiO5Bl8Mq-<))*>C%I8DU$%9ko*KT=+iOi&OP6)GT0u8xO zpweQgVG{M_hqtO*MZT~{{;lUf;dCim0d% zQ6_9t5NU4vk}ZNd!sFoJz$@+4aLIk*>S&4gMck9fGni9E%nlha(L?iPdrHzg>&};L zQ^d=l$%HoG&SXLxvSu=&x93Zl{j0dZpfBzdUQd17g5w=Ccl{M-!D%{2{O{nA&sT`D zH5)qCrA__~M0kNCk$(}>D}4)!$bdu{OhVLYNgT!2kWM2?RSruLhau8Y z+71T(R=l*gI09#nBM{%^zJyp|KY0S)5g<0jK#VD~u6f{V^gOGyV!bw-Ol*eE<=-2$ zKlmBTU(OC*I72XNt9NY?xT>iBmP-)1zr+b1rU_*PVvzuUBZEh#bHvHCjTSPrqzfs< z(?p~_O40~*pCsa%h%+%u3n!VYdgDZTO;FRVwP6yqVZv}* zzu9i-zdT5?G)v=jx;)P~QyMz!c+Cz!fwwjg)dl^R?Vjj3GrPm`hpsC}9N4w_U`-u8h&-)XFk0IZsY? zaIY*>qzk=+B#tnO+6sX-O9c-i7PbWrZ7%V|pKT~H?{2rOewcB^nU#{c-|6>yQVJMM zr6g;EK!<6D={(TyuCK2<&U-f#q)t_!H)Sd4%B!zvO@h8o%VakgwZIeb8v;4a#Wg#Ap z6NU)*v7qsf;xRf3w3E3*LgCjzKo*aR@?#+81w$O#RZfq^`i_|FV=Gs(IXEq|f9iZnGICk_ld}X+9H9_e7m!(gUa>}V9K31?$a^KP zJ)Fo(5>14lz*sFZ7mi!bT=Dk}BkTkbgHjkVN*0CJuzIB&sKf#n7m`E*^J>htT0ILE zADc-mmvyrAD;%4%IMp3~@1EX`wndzMy+xMr|L<@V)Yl{xt68V*JKtT{e1D;`!@%hk zv^>f|30{wSu&?fyVp-^G85$@f>%Tp;&A0oG7|`GjUvxD_>5DPaf78GBeD@^G&G=4}*(ieC#Tr(%d4-mM!7D^LABEhA)5(Rb)@5sD9A4^hb>%=-Gm^jY_eN$= zmsUOcl!>cqu=Y4-@%I+v@$w#Zy#wPO`{^5kA} z*a*M`O-A5ubJ#cy*guM#Heh$Z-#d_eU?pg&@Ihh{ifq6L#gc!1mfnH#Cb3&>I;=ruGAxL>7sC22o+BIJY5k z4tsz0ns@tkdWFRY&K+(9(uGM0A(&@sj(tiKK-F?#t6s#ZKGkP3J}4`PSLpt^!wYzq z?5g9|EjYc+CPso7ou%>^rJfih%{dQ<*NM5TO5EvmjoC~X9j9q@XOlzYuxfG`Jnv&6 zVSwM|>@YxYG&@Y~dv-HCdD2pOz-h6`DAS;eGj!Z6lWlSoCc;^rFrAVqLK#Z9(S{M_ zpwz7_DP>#({T>$umX%vtY7VWNx||y-0#BbFH1=0C4hf2ApqV~&@3ay*$6x{wq)R34 z1!E;CL+UK``?J^Q>OyKuC-5 zs@SY!s_+AMElsBBjk+c)Htd=#{7_x{)8pfRq`K>x%cQzui>!NDy*RkTviN3g^m@JC z{@$MWx7X{H|Lq;@_W#u18w>}%-Q8ZV|EJ!d*BkEt3H0u|v%V*%43adK|rtABYPV3Lz zFJD@pKbsh|fQ22&fgQ00+o`f$0NSb!o&eDKAnl-OoQ`4K!Jm%#ic4Q3s0tF8Oc8jB zlL&p<0Z*|&boAU*#-CnRnsIKT1{_km-EP4Qt3}rc1XqW&6DGJ5CgFrH8W;Vbb%m2? z1k^s%k+{8^8zwJI{@d0ZF(@Okbf7c-)c*V#JT2cvEM5wndF%SN5|u_s++M7D^5x5q zqMIm*bdO7aa*8z^|GN3ljb0eve9qg?n)$zXaB$$x|Nd~ecknp>AL3ax86^)m6R?;< zzKLfQkacT6bd-gl3p`aRYxSn{=()(Ftt*);EN~)rer;T1JnrNS$GT8QfeJupy9{3V z!xZdNlO4ItYt{lUTC}qj;gEqqE-`{K;O%Wgz^6Ew65hU?=7yL$ZSWOZ(#qREq=(#s zBDN7n&q44sNh5TLv!Ljw>fqkquGM$xcobEHug@wE*-X6e7VlKUB~W@CWgouqg`WM! z9#Fn?a^&!obYw)@7wtsTOu=7YWO4C*lKUF6(6;yo)WURr`enNun#w}+Q8Q0fmRvcVXK8xHA*xHWgGE08!LdG56WHwrMU9~77fKje zW+^u`c*m~MSom#FwQE*MLoK`db8opaA*%vO^;$>>3$i^Kp0BE-8&NFjp^rUhwv-5{ z7VC&Sdv=euZ7wMxbOSgm*b7ep`d!V1@=UP4mjtJ{-!9PG4S|ELLerMN9kYQ^MrVB^ z_9n;rhBAL6zGh^3EhvLuE-p?>5}**HN{R-a$?HlN2Qhoxs?w9i)a_2GF&eBKJUx0a ziNIEwOT}<*gDvmaT1-)rx*i};E25xgG6`vC(LjkrA7Js#1DKoNj{UvpD{I@x6_0H# zfws)Hjlcl-bh`K+fDZTrBzz7f4D9iSHN0ZGj;jYV9->on$H%CRKfv#K%G99CO+itI z54HPEc&f!W-fQQZ^i+Jdgz^uIQMdcUV)Vn}hecqaARCq7C7^8^)as={d6iIO|A&aM z?j`@P^w`{LA+W~&AM_7)OZNZ4;9&4*|3AdD%KqoW-;uEbauFbPwUrNAn6j0*B~KPi z@;K&y@j2GEMa4VeGEh>0xA99FM~H|*Ml8-C{S__i3kP=o#6ZJSoxig>I`hS5_ zsIHNY-3B+3_@|)0xXC#UwynhZbHXRZFfh2LL4 zYxMu_V1K`)|Mz$MyN~++As*rXKSPXQv_K+cttT?jo+Q~g6yxGWFtzq#VF2S!SB5&W4t1JiIQEN$@35f=m&cANu^DX>xv z6*OK)yCSajhQzb<-8V@Pi8>La^-LGwL?$4b75Azb`-p-uq$tu6z48_a zB|TP2QqfkYU^wsYv*b~$l-YgMev0m&!I8Muv2tplh=x^Br$tu$;*>oQ7%GQHQN!=< zDx=&n732z^tCIhQ^VoH8SzsOKm9ZGC&Q|dYM5Aq+P8EQTs#8QcQRp*sxsExSqfZ)$ z)Wi+})N!GPy)S{)?!Thr3Y^DfXSqXqD>`9~tg2TefG)zv-9c0(HtoX)li_gXSSskN z2hzSRD3C2&p(1=hv2dXMSAof=6o8=3UoSKMTApbRK(MfIQy6ToqFPj)3_7mDqSVT1 zrUM|{>1M`IeEd+DJ?r4q5Ud2LaXUb zMW{CyEa$S_jL$z=*>u=0apxk`(Ld|?TL$=89|W51YHZ8pP7#jd(n&?UwB1c)L)0y` zZ_i7qK$70J#i5F0WnT^@M-ySZDdad>O4M$lw%w`4UK&r+FNorZEoXu2x;0%oG!W*VXfa&RIeA z^JkLg8UKxv#mJ62SEtKX>lt0hR`W24Ol_gfieK`iw6%YW8PY+u7`^ z#wkr8jzMrL_A*T>I1ad595c7lWB5)6)`lplzeEbDl{6^@@L%nKrwi#ntMvWK)8WPX zFc@{NUqf=v+Z#ST)ge4LH56p9k8|E%=JF^yR}Y$(6z2~F1~px3gP`3O#sL5GR;UK5 zrCI<*0uJzp$(vvW42yB~nPgU;TPvxD+V^Gz&qdIe{Yk}Z=|$i`j(lk-@dTt~1-?_v ziUnNLax!B^)6#0i>~N)7(FwM+li`vyW!(;?v#v~#Ay!6>C&GykKzqqau&bzu?oz{-d{x0bFDM^#>LEueUqwJ=%W{@fiD0=a>ww#E^2_ zsj>cK*2T@NzluAs{QzRzb9}E+e3x%`zZ%W>n11JF1g`BDFT-KUZKSJxHam;CSVRptM|&R-47@A}nWeU4xKZH?R4E!M>8>(+2x zz8m{|0SI9R$2i6eBPAVS6cxF8-@d%KJbLlw6p8tH1r!M}_ z&T{#{!GF5xRiS^DY*-ce=gEP2w^4sSO?S^Re+79~M*KB2#_Q(4&ig9tKY8Enz1e?z z!$Eoe@9jO>e-H8)`_Im$Ji*h=eZCq%$1u#Q32aJRd4p-A`yxmDjIr!879pRPGA+cj-l0y~JtbM_ew1H?#f#MiTl|^e7|E`7 z**xo-@5QY|b+(8>F;1_rwu-_Sqr{{^)>$Vy-b_RQ(2&3kDH&k-xV@X$R(n&E&ZG_g zk&Z9TSUKh>5O=EK(1p+I$Y4PyS$bPsq7lzhTBMk_UGMVwM>_Vk!=KB`46@nfrCM>Q z93_D_hs(c>7o(BD;sbry$S9CqB)}y#B0bQKV_N z^;*At%(H;x^tE`s@nO%hi{egBeVVQ;?(3*$N#)=BfzOQ=uaRbCU`>$7?|NZ^J z@X`PCAWxnB_u=&IS1|n+S>jlIyiA0t(vu|{P;lomL#~2Gzk?vnP$EFBu2Jj!m&g=Q zfZsYX?OkJnra2^Qaa_})4ad`FC55Zk+*o9ZHZ(lQ6qnjt2~z)k+})2)=~*TJ)dc8X zO76V3_5YwZEZcvB!K3~6AWxnA*T;e6&;zXmpvhWNT2IHAGLTNZ>*^LvB2g21P8V?* zDxJ?0+-P&bh-LqhKh@`$?rFuZnt#9rzv=MC>wS9r#7?@q^sbXRJ?ffo;%OxR?>Ya+ z!Tv!x|3`oKG5_C#JeBjGcd-5I5s}62ulnfQ{8gXU?EN~Wnr!_#6>gX8V}rnN{pS3? z&oAG+d-4AD%MEsoIrYBJ4P(wicePinsBr(=#5J1?y!|U2$LH6Wg)_IcS0`sLe>-~p z+HNg)_cpMKoV|O0@$$0ol;|G}I{p1luhZ-H2SE$C_vFd@N+mICnBtR+$5S_s(#w<6 z#h#0qZ1(eKVR5MoMF&2*)C{>95y)lPE1`2^;_rKizh9z$|0dM0=hBo|cYImsX|bDAL=t&#-^y|sr1Ux^ zk)#Yt7OzM;m$3@cf;&SKE!j5q$!alg;a?4jumT_KP@Te?(V;U)P}DI6H6_(;{o?Bi zX0^N>&M+AtNhSV*+dH~ulVAs4HpUB-AWBb3Iu;E%FPg?XwAZw9KhYG8?7#cX|IynY zRQCV(29NiDKge@G`9I35#`aAUax@S(Pi=9tL1g#Sy2$Pir*AKh-e3GuxsFdLmnMR@ znb0+NC4J4+@T&Q5+|jr60Ir??2bKNb;qGJphX;A;{C~gcvA+`!pb{Bt<%YEZ;`iJ}j<0X~9z1+jw;P}7x}))LIR9_u0b1+-=~wQ5*xP-~|Meh`(f`HF zx&sf8cj^>AAoJPh1u`Gk_<>60ns|arRW|Vj4fhXA-XQtr*8ZSkQF8wB^yuv9;@z3! zG5Am0rEqe3arD#cm*F4az6zWjg3uiw9T`Qq)%i{IXz{d#_Ra{6Jf!cJBA zCEEY%`>Yz$Zofpk##C9)%-@9{2eHtyU#_RUe;bd^W>3Zb6L&jwFMml1{wLSn@o5?z z9Ac*cQUJj?&XJH*Li^4PQ-Cau05og? zQgO=%1#AWxfCPb%AjnYE$|+8!YQe}k4a9g%AX%<7BIW%evkcl7hCG#L!Z*5izNpOK zZhU3EsyoY|u3EsczFQYP>bqYuSPB!=_u2a|M6u8CJ2!r6K-Lv9sl_nO!3w znz~I&UT%5vnxeG}!Ezkwx{OslfP2&-m0{#Dj`O2Xj6Jp!t?m_{dafV|pl)o)a`Q$uaI`=KPLb7!hg$2f`0S>= z@b=^lnx|xWmz|jlh&Sm^16-Qf33dAa_E~?5XPy4GZ4lm2hr8z&Z>`Cz$05G~eeTkxs@2`^H`DD+vpAI+Ghk&B zgE=BoR9u-YwYQ~@A{?@9uQT7?@6%rY?QO?Skn62123y6dYrDEZSW*+U$iXB@nUKoO zFtp11(X3@B-=p7vYTciK`{k{EO zS^xJR^FKYzv$6g^QFq1Oi}p8Hir$g#SMWB}{PuOYx7PdRyLG<-t#4DMs`Kry4K%)m z;M0uYIV8(-b;a-KIha~I;QHoYuad^&PR?*#+*T(+l{Va;!kneAadLH!O(=b>T3E$8 z;C^K25HGN4kCuI&7;vGYLvf_sF_+@5`CbO~+}iuXpV~igZm0vYU9n<~ zQox^3^ae*!jIJS(;ydu8Cey6EDp$}#wiN$e0xYJ!0#s?!k?6cd8SZVp_8|J)+56i8 zVmkkqn9-H8W!hD+3$F4pA_-!Mh9n9Kr(t=2y&*aVmD@I4tdZRHQfV0Hbt70FmbrIC z<{J*iyxBO+R}I1Z7SykAzn1VDG*_j0NuYX$Ur5Wj^TJ51b@cLcY!#NF1s|1FlW0YQ z)YsT{rN3q0gFk}UD+r5fN)$?`g)(<*To$&de|U#Qb%WUFrl>d%0!AR3;49Phg0DI_ z?UFQS;yPwVmRX7uMgzwIU3{>w1HMLM5kRFQahf(`jks#Y=7CDY(8Ks!ZscIm`$l#w zmC?wn^PS|5yCPQ8ip7xvsRkpk?V2Yi$W27(A2B31&SxI!-|0}Iv0w$)CR0aY56e7X`e`8NO zXGjE}bj_ z1rj*_>;qfD41h5VuTT<=oR{m7kk=Ssd%IFUh33V4^OE2&`|L^{wbpK!fV0Zs9|L=o5 z!vFh|XZJ`4zyt5?STulMjOzRCpPJM;58+`6H+*Qt9qKHnh$61dl*f^PXt`5aAV9~ExT2;~bRu@>`*FLabretY! zj$#zDl#HrN2ZOL%43t8vy$YnpZU+?5y<<_4 zIcCK#cd$fB`L};DVwdByr*d5sOMxSes1U>xXmNpbWM|{bhhj~Dv!CKLysG`s32{W+ zuL9z8aWO`*SW?9cQ+3lcDA<7)vQoivmnO9V5I~Q$OpeXA{97>lA83Z zk+F^Wia03%t%2eZVEuswyGr_X=-Gs*;Ankpil_~5b8K(GI<~NH#57igD!WuZx{Ols z3?T#U z*|1-0HZ)XRI`+bLvien*Q?e}#uZs5KFCX>SqyBo-UyY^DqyBo-U*EI-dPw#4`KzRW zs`LM5i||fjfB)1V|4aX%eEw&++j~6!`ykK8@xQ0~R6mpV{v5{;&+jK1I9r6pZ6F@c zt$po9yGQ`B+G$(kvMs{`weDJX&N|cgX|@PAc46O*gI7V}ifzks7C9w@c2Ek0)c97t z!1~L|Cd+gvdShbdQsV3hms<4~E1(rVWiQ*6&l&kW$+|h4PAM^M6T~1+fX``L?{u}g zsOl@S1~U}TJ9O67XFl6%t78PN5XxE}RsL}PH-Z^@mxL$~Ng1t;dnYFc5SJYxDQDau+lR0!W8)hGg`1QlomD^`OS6S>2o8bZ65JsKhv4q+ zF2Nx<1lhQ|y9IZ53Blb01b265BYQ6A{%`X*-96LYRkglVMbQ6X*r8UjT|_>AFLB}v z{c@OL?s6K(dn+-!PNu)8q7FHCpz58*MlO1oBhI4zb8acO;{6I`M`sGKOg?3=1? z1RT8fgKn$dgUD5))brk;py3xXvc2VhKq<>(Ctg^dufYJxKj+2csDs69w}S2J^Y*#@ z@J)XS%Y-7E`Q=g#hqM#Rg%nby@i0r9<{dL>OEEnB|6n9f`K#L}yVt*`ATRV2=o{b) zsN4gVeY=2Tk=&U3-l+^HB?Nz{9_OWLL2S<~lHQxyKQZnvx_Q;G;YLp5(;|JPv(8@CjN6w71FuT3g257ea>NI$?_R$gQy_K$CZZOKfYT=W>XjU(%#P4iR#wxg= zq)r4*AN=@}Dt4_XshS#UeTF{8h2+=X#`BHa@>+{*a4CqKMzDY*`?F#*ff+$HuMNwW z*=$vZS2yHedB&(om{>uuWT`x)9yf5en#y4c9c;1lr!Dfp=FlX4jIZSjC>ti+S0zvL{hHGzDn`Ze-&lNTRkrEkGPKt$VOn7 z`T!q7_;=O=Jt`|P(#c)W3vo@&OCw7?^npZy zhNn+ngRa~4an%=B6E?-msylzbv?JlF-@VcBz{!7UPxBstdlHxG9c}7Gyhtj zofl;Wtv`LHt;0whHFV4hDt3;h_q5M|?xP|*`bU7YH&l|9ldsm*)cCyWVZ&QZP<-i! zlQ6C?+z}E?j~PC)pBZ=9Y{VL?R4t(P{D!1YoY&%$FfI{McuQ(NuA|h2navf6y!c_8 z!M7z?=A15~)tV|%q;85(>X(bzQCcWxJkopDzfzyNl zS@KI+s|#$+GH`l{F$U=k+BSP#>K7ma18X@i-Vtyv;EUDp55KYufqjI}YYT>^@CU68 zrP>~}_}!B!#ulx)=y>I`mmaR*w58yNRYy-jW3kJbrTJ1^FxjpXceco%jx^0_hhnJ3 zQJ~LI0&@ADko%b~rC$ePDsGxwnWIH9mR3D&2-Cm=tvbx#3`HfH++>TmA@hF!0ftym zT4FN?%Sj#Xi|-pfRe5(nDeWh-yH{gk-3SCSoHn}I2Da)3ib{PN%T{$ltxR{oC+VyS^| zMBNcsNHyEv7!i)!-`A{gEuOSbO91)B5nPoBDCVB&(fPaGfIJ@anE;HRap3noCgCG* z?7Z!jt)S%CD-0978JwzhwFKR9Rp!Ws&xsa1haQ=gmiXbn8gtI|Svo5d3up#=y|n#V z0#ja1QDjsG?p8#oo zr2x~_g?LS=?eMqh%6NQAgd9y@dIYM`SWCJtcB%sTme#d&x~G!ccnh|v^d`6DV0=fg4%eik0}EnIGC5Nu+ej1Uv4H)M>8@+M_VgQ-9&FV zlX<)i*#i9|kA#YMmn%kAHlEJ-=_jcNuU{#Zg_)eQIo08snGl++xpU7F_9lB)-k7}7 z)HJ3rqh`K$1TNxoOR3$($eT;>wNVx#H@ETfw%Na7+{y%agvCMf5WNQM{J``MU{1d<5xxgOT z3HsqA7`k|^e>MA=rnQ4R+2-r$F_s>Z=mU(+UtFY!wV<{3J7g2E50BAn4h0E1e^sWP zF0?Gw;KK~sb8*9cH~qHa&=s%^wH#Y1HXiYXng+t2g0Ln#=sYfaxy!Uuj2UQF%5cuf7 z#r{u!<|sBr!pB-Ft+*@blz*2$`24C7MB7Bk9iH<=AGEW&lCoX{o89K!fJ@4CeSGj~ zKGfgl8*OSMJ*9Q1bQj#`y|sdN3ENo?6RLOb1940TSj8{6EU6j8zY4#wj*Z?Dhy*wA z7)+_uJ6^Pf7^(|`+$k$hp~X0qK1SMXMb;i#nbjqWgwl91LA{XYRl*4VbHDyD@a5m! z#}oT8C^!`SU8LmIwdVi_L^pgem236bff$i=%c~IiQ8M=rZfxrVSj!sBz#c6FZ3zLxL`|suP@)V`FSjj$hm!roM^v5c{U5bk zw#-U=`O9W(X-?SP6IX)sP*n%*=AH6r9PbSK`H1-+x7+bqUd57mX8bk{&jao0?yv+7 zQwxXZw(@HMMbrwzlThA!=6A*OpTobQZvRL6yhQ(FOt@bjGF<|4Y7fZ6;VkrGE>d4L zD)vUPe6wh}WStJ=J@$Qoo3s7dsBsTRBj9m=xznTg8vR+M(%EyrG38^o6<6?=XYieG zb3`kdqG2|%!TZDtfsgOU$MIN&vWa^ISeqNAozyw@^;foqy`0={w)dC!uV;^Em1t{~ zSQHuJjfuT~aQ$F`lrGO0yehecS9E;US+g(NpAUH%oa^T?3Ggl|JKLu`dL;gc697ex zB0pz7#n}ggjXGQ}=!I!ECd>!zlCEL^D?DCVJum9IR$?=vbLOELr8hEdQnIbfGS+~o zgBuT~hw03smOWO}ClL}qr@9XCm6&UXU+KD~O0HYol8|M1s1rc1!RjEr(e>=9%pJq| z)How{aL&#VCv$kA;$6nn+CCUp%2>}xljQj5y>QGujlmhC+~7HxvA_paXw;s{U?h7q zmuNf5iij3vxxSO@kW8M86EMAoJJqnIesMX28sgc2gXT^hE+gyjXoyf5P63e|-AU=- zsop_A|6t0BLjPCO3r=H21-xc#q5YL+k*ABjwS_)gc$i}ymB?fx1IA`cfZ$@m9Ki?v zz3#=$=8{>rx!7!)rn5eiX%X&HvW^#^#WW|O;)N56C1B)4F+?<`1(kRVY!-Q$_N(2l zLafk_@X!{}4hjFt@JafuDM&6}yyC+_~nhj=(FRcjPTFN+y~D&e06 z_pab=sO%~ly{vW&z?3o575;gZ0>>a2n_J2MX+W~F&85K9r44L(w)%-lcsgLh*sQyv zkb;5lQ7zr%r!GUWrinu0XMv6YU_G}PvdI+VKm^k?1gsLFGamLnzis~l9zT;F1NH_J zm?Lx29WGz`tsDLTtJa)uP?px}-uM$wmKF`#pR2|$Bh^_deWVx8Ru|rm7u-X*%RMJ` zD>^h&nSXw>%c8ijjoVTej{RKBXH|dWtOmkEv!oj{6PGV>e;F*9`A%=)XwfCeYVu}x z(YBY;lu`*e_=j0oNPb}UaX$##ee#HGbJtTaV&Y-AU15}`dqHblW^FJZWvVRSnshS_ zc@vM|3tW=<>Qz+pEWuVOKX(Y0#iH7lxADDQJiV-Kp)M=%J$A_BtylZL+w|CQq;X|In=Wc6J=ETKMN}FwQZy|;+bq#-e1@D1x2GA28e^^ zR*4t#ByvuoO4wt@#QZFBp>(Ilw|$VJjZflQ+JL#QDx4eSHCt zW$Mo3CQ~6xM_W{j=}NO0F8-+p_Z3Hh)9^3xAbv%5`QkLc{%0EN;HhfyxQ9!AI|N-` z_xnu`q}*a1!qWMDFGAeL49gST*x`B2Y=0ThOmyRsqhVc;tukm-IP8oJBGTmR zEBDqO$z##jmoX?<6_=5!)(Rs$X)_Xkw|T7Vim!K3aMTc`jfz`bO!n^BF;Lv=qeU)M zPsih!hI8_aN;sLNqSmZ9MgPZ6{Tst|_!(|50M)B%VpV_v=10mR_i@HsL}RtjYNnzC z_Q|wE&sm51a6S$dD^p8!NJ%>&SW;@BkA_~yjCfJtfiM1322Kp?2dECcqFn($2#r({y{(Qd-n zCB?UFh5PUa@l3tY5{gf=k##y)^;Qf{wl6ph8PR-fM0eD)6?frBDf2KCIBKDZnC((m z;`niN4turFG6`a78i=l~ds#wIa?>Gq`$KzOK5+Gg{jvt{I;xBNuqCE@D3{dl@Uc_d z$Yw{w1d1~eJd`5Jsj3sIeoix~C=57+Jx>cIC*n~L#ZUbq9$pY%V1+mWH`f&-S3zi8o(}D| z0@G^uZWc9b)du3>dpQRJE-2(WGXF3#$ZIWbjkQJpMDF_cwPEiltnrTTIJD7=khd)I zG2a)#)8*azgAh(a!qDy+RMRa%ilLMR8g5RcH?gOp3Y68vhZwR zYQ$C)4a~>?SS34>&r_MD=g(q2Vmi}<@Nq?DpU>s#n7uSy-_YeLT#yX?0U<1GD^3W< zPFz~{X@(uer*6{Ajzl^KF;bB10nzsJ;_UW*r&e{Q|4@TM{m-3dTZb*E->9=A{L5?5 zSb5fh?m`uK@cyz98jSxC7d11nqnHwYRJxWS|GpfbeyA2iTLc|HrRw}%tODFI+$+JG zh=}iEhcM3~Kq z6d`xcr!8OSDoP*3*8jBj)-QHgj^+I}v%rW#aWv>^Y3)|bDGj`Nt}#50vN;`(NTI=& z*kI722Uc}<#++L5S{sxHZ*^^^927w4Ft%?CuqlxYGs;()F5!lp1P95*x6Yw7e^)HqKk^zo?$BLWdct0{2t$n8S9x{4D z-(P~B(Za_g|NCu_6Vs-g`T6&sGXb<(%|}yenVc`J*^9Z0sA$1SdTzhHe&Vw5H=creh{+VKNfdhVJ<3q38C6rO*1-j!}dw zJfFl)&a(GZ1ha>1^^$Un?`1I2^x^ne6@wTEI5(iP_*Z^StP}6*fTSY~G*B*Q2`8+7 zwniv5b(HzU)N3DXl4H!wct3rr#>PjFR{6#ICk&IQWu=T_)-L`IIONknkJH}$ST4CG zPHW^j6=(kHzF$;lkeH@W?m{j1j6_^+`sJQ=8E|+mo@+(kGlfil{pH& zA~caLO`|pNdDX|KXi$wd42HExZn~fEkRuEjkU-5jh|V znvDHm$2Hx+t=d7Zv280Nr?d)0^8fH7YBwUHEr88_sU>vUn0YSjXzWbPBvZQ7U<7cTLdw$2OBG#eN~_{n z5dI&RK9J+^T>Y_ZSJ#iLj5qR!;Wgf;0(Jy_ayf)%56Y!x;cKB;TY=$})l}b@^gliB z14;&qX_lkE%Q4JUa1>Y5ut%u{fT7Nt`l2WVf@&#k|gy9tvC* z)vG$^gevr@xQI~wcyeq(C|>p&sA+UC+2M8z zgiaEEVea=gE(X6FkJR#3x*V{&iM10(GmYe~#~q#;)TD=45qo?l9b=~yV+~(j!Q-7S zwEI`^jxFgVaE6S+jjo2HlR%S&=XW}Zf^v#|wVGvKDK|V!)&VlDAxBA8Q)R}UWOL?ai zqMyq~OeB6N_w0@Oi&s&Y|1byfT<7Yp@!N_K%*<4k$CS3u2jS2p`X?jUYaz%ki@z#@ zjv_EG9HT017R=5zb6LnC(zA-DNaLvHE{iGgp|Z1c{wu(p005Y@k=#qrr>~%X5s7!z zKIz+g)x~qKcPc^#8V-&|g%44eJ)D`Ynv8A!;PV1r?|}|gI+8@X%DEu+p}#{u5v1Va zmhMkZiN5lUM1@lu(~1z&*y8{^axhzZmQ|{Ir-r_uAWW3sDY8o+Mbb?3L3rQ0ml}0s zSIZ)@QAKAH&y~f>-H6$2y;U|=({F2*xUrIBjobj^Sqx!vCnTR%0eG%_;pzL**(V&; z3YgtHIhL5Ur3R^$UUL)WfpL22>Ap|Ook0@y=(Uc@Y!#GHt6Las8=FzeNKDElZ#2J& zE%pMm9n`BjxcX-UcAJ(kwc(|hZF2Uy;6H%Hv3Yej4qVvIz%skcd*{^%OmsnsGn3f* zoArg9Mha5B2UMC(Y$_VP!@nFJ!v>GS20?FiR+XBPot@pj^{0lpW+$7EI9Oha3ZKsv zmojx($%D+Kv1WFSjx7{-sES>`G6Af`*8(v!F1TTkEp3z_R=E$m4OPJ%n3gc}KQmge z9Y`i7``#!C!>FZqaNoXZ#$qd)VPLGGrFiPun<#6aC}gP$a2loRd93j;TK?VmA=aZ58AK5o_wVtSQYw zNO}m3S#Uj@B0`<_`a~JJ*3wfrvWe;|NN@1>QchpT)4p!%Su>C3R47C07V`cn$i7PT zK6(N`zrf@xC=vEz3OF?Xeh&uJq4NMGKiz#m?X_bCu*7?R@_u|c^mvy5j<#@J1Lc}V z#0JD~uC9tU;)GF!FPD-Xau+vw0Pybrk9aS}2I|XqO z@}D{^E9NxT^dW85HS;;H=d>PqEcx1h=++^#@p1QH)r2(byL&uyXamQ#z7A(l`iH>k zxyCCf=uPTBjbqF!XmC)`;{c{=4Y&E4q1GSMzXEYK@Y0FmlabaFR+MO^LBzgu2=_I= z^KW`7y{*YGLZn`zk&?7@Y`9<4R=tRZ?`EfjzBl_QR?`DJVrb`StbjFm?l%aTTldQM zWwvL@k`fFOL);<+_ihUPV;luUKu`Fe}3A7kK8y+5POFHlE$#p2^XxdvLk z6U+vselj=&)Q~trN+A01i}O!}O9p5ixK{f^+)$_eFGH~+VqYB-Iv}+Vs5R%M4)+Kb zeK0NEkfsgv_f+K+vTO5t-A|H}>eZ2#Ma4N;?F@u#d$S7^4?EfW=ikG%Gil9=Z7DEs z4gw(x8DSGA`D)w(O?`!@fpO`-k0?6&e)<9BJZ78QKw_;VrlYyP1G-y9%#AS= zjnJFp1VT+(`SBRLBwIIpwhHuu+K?k~6doVTK-CTv1{@CS)HDs!p%JHLm{D+-bL zeCZXZdD7cBu1^u&+=ee9-Q0_GYmz*M234ks!0Rh4a!Z%P6Eu{VP7LlKv})Kbk#x}g zErv|wKu+Lu!MEu{@Vyq>&$uR{>wjX{CCW*6IQj!C(}ks_DRO*!`$s!&1laxkr$uRS zp6%_L!dIWR7cz5US_cYami7BNx=!ub@$-DR;IS8FQ~ucsWuX4S?cIzlTB2LuE0+M} z6WFKscPbbOy4YP}{1&#$QsRsYx^Wvj!ppBna&G#$FumwwUbN|_kE5o(&j|i=jHJy$ z$f;kc{}m(qD-D&pi_-*zL~YI10UMjphn+ktc!2KRhBF_7BV@CY^Ho(RPxbQa=9O+a zj&HtK@rk=jiAuui4lfDyyfc*KVASg>GKucTjcPIF;%1?7mZ4mGmuB2{>zW5py%0CN ztV&Aj!x$IDuZbS5fp}bO@~;Ppa=CtvR`&*#YiZ1C0ob}Gyq}7ody_?(kTS9Xi)PsC zmzs)6EB-EW$I5Dk`G)g7V?U* zx-n|MU@{Ve#m$>v5O@3bp-mQ1`e#)J)=yiQK6Gu`>wUt$-fpq*Smv+V^n2_8EBdRT zbT3SGzVuWsyM24qKP9ouuexZ7^{$>&wEd^|*j`O4kA*dIA%!sux7S_qc?Es5G~})o zAUp$+#&~P30#TnHdlhIUA+7xPmXKd>?`nSj7o*K<*BIeMc39~FTi8+Z6U|0_(N_@c zmAd{Z+ZL#YCK&y0b#IAMR?;u$6_P`7d+RfAr z_jFxbn0#lh&Xl54DAh`#a&Ju-sBoY?)u%pmS!jj@QKPBal$o;Hr(CCt^P|ph>vZY! zUrM}j&Wr+-ecs71xzI3%zi_9lI+6~<{i6)8IK*WlVWd?&ky{90QoLkUhzswWi6jb5 z5PoEc@xVHG(kx(o6F`QGojZt z9`se9-gIMR)XcOJmJlXhDE;9ULc1}l*vQj|@F&$D19{Jl!>{jK0^bM#+ADz`p^Fy# zt`@~P*EF!tpvv6jY@`5<(_AIGBA@)@LdF!ckcxueDX$^XsiSkq!K8fxh70i-{^=PaqfgHq-yuOB2*CDx0cGdJ7M= z2LrW3SXEM)PuYcEKloMERx)r#;hfb1YBA&q&SJ>dG4mxD%LT4S{mBhY9b#_SR(4fE z&iXQFPlH9AaUa=+{Z%!@Te&5s47J@x#2dF% z)dns_ax2hiv{ABLN3V$PsRysX6xLf0XK#Lr)AcrXxq$tRXKV#?5T2(HmW$S2Y67Q| z+lHv+@pIdo->W_*WMmw8{KotQ3Y{Y&&Q~e}vLK-8>!Axu02Dqv1nd`iU_smDa7YI* zUXS{TeP2)~&}!iKa|i;q}8iHnL*b_X`daFn@sxUz-bJ$}UW!XUL6$UC*32Bri3 z?REumw;rxRwW`2yjy&0$5XQ~fHsCzx9S%*GHtuIl-fPEI0G*1=5xB3800{L6m_U zf=;AUm*4Y9gBIFhKYcc_caQ`$OlWG6Fmd{Epe4wOOpC#Q%T?N0UJyVC#rdOl3xPy4 z(%l`K#b#oR!~vVCD}+Vx$sckdDuxN6W4HiY?*Pd~UAgD)m8genpxz5;<c-`KM!b`)P1=qq9IzcQ3w#FBxwd+ zk7OwCr{1q_3J@We;aw@n`(8y0Aq%6Mgu?mK>R=Nd zB7aGg{3`EM0vafn)3?WsD!6V?G&GMcF5)pnE0Qt!t}{!e>Zs0_QnP{A95$wq8>@bi zN;d$~-h6H>%bBYK98Cy!J>4FWwtS!SzCOsmIX-9uZzj3uFMw1%DU^OZbBYWjeFQ~r z7mSuSmtRk&d6I3LjWpn;fVAE?YzuvILaGFCxCjXb;#ALsIXV#s_OZPk3iSiG`@?o< z-J^G|zn912ENhJnx_&w#8{+xGelDaC+CQ%Ch52?YZU|3t@ya6r^FgV_yp1|&0A~x; zoP+wBVI=_P%MF1VGBh>R1}3rQFgt8|sb&e)8Ujude*P0eDb+@PdMr8wBQ_1Lie91N z-P9o-ZrLip8kIX8ZK{56lx{M1Y0q7H^g7kW0eSZaT|Fv6YQaNsuKTU`*W%&BzFb`h ztNG#e^s@%1M?B2?qzmO{+zXK`c}=_{abdThwqkQwdURu)^EPrGq0U$E!tH5ZZ@cIH z*7yIYwdWH>z)#${Sdrm|LU!n{ATa>Cx z+!ITBnam%08;pCYOYjfR7){tkLov$5eT02%O?OYHq)<25&<4^-I*3dpjxyo|!7-6O zBlhd8)nT=It*8FeN48#A9Hv$0rhfKPk&Z0IOTHiE_GK&x=qU3?ciPh;VoHr*y=DqL zqB`UMa#JGD;}#MhfA&P)*yS-FLW|9)R)16&U596HY8N@?U8Z7_FurQ74LJ4Oh3=J> zuTW@KM!z4IRj=(u;8>>^4^9>^=A9`@_yKManv`+0d3rtW z@L?IKvCRcKFP>BY@Axp6%tktjR&q)rIL{CYHtj!;R#118_=#-%9J`2%uWK+}o-WYr zElgL~i1B*m=Ntob<Ug3LPw@*OOF?FyuJRvtMU13@_kA29-+t2%J>!4HoaTwQssWz4@N7GYbugzc z`zbLmM!IDlvu{0C^}z6aBru&NnEM`^&X)oEGRBXkFXizwzCVoyc^jk-I}@)6Ih)ep zLN|XS4MEG=XKn)QXr*3&V-l4p5sn&uxAZ92u?KRUCE%Uw1q2;FCmruXK;cqn0F}wO zUJ6jH*jd${Jl0JTnDW%VpIiHz2&ew{`+B2pkfY2|1w!j4(TUTy1<-&0DZ9Khn4{Vd zaMPt!LR<3DTLU6`J6Di}*WyuWuIF1?rug)kM>dSEgwBF5X%RL8eYpAC48L+mia-}T zPF|);`Q^VQ-vWF^sdgOIyYW;Hn-nDpw0OztnJbN@GV8FF>H9DKVa*?lzZ0~fUlDJ` zT-I~T2Z^z=Y&M<9L7ZB1amHmI%mol?zMdW-)oil4U2NH9;f%NKO{55=X(n>b5Ei4! zI=S@)h^(hB9eJWo1Nym=V35#u-pj6#Z!0!%j}L&^Ff7?Nf4PQu>Vw2#@FR%$Z^tT} z=xVO_7$tg=Dnx%F{P-o?Y-01}mU=|>AujlpOXv+1OLj`8!PagN&PgGu)I6y9y{pE4 zKCue0A9^pyr0dv1uupl@k0uM>%UL!zn<9M7HLRymCRkb$d_41s5~yQ(KZy|UYFYq1 z`&ZDxTknP4nc%^HYiR}aQqQ^vO;Lt(FP*q=dEddWsrOlWlfb&gklvUdDIJhmtpM`e zld&LlX?Znl3A%4lW};wJOZfoDaomS?Q3?8A1hhX{i?5Tu?722UjE}E z!fAyS90FleqM-`SQC$?vtThnzylBuO2zodHK2iexx9_MZ=~4MQFes3vXSAqs*>&nw za98ri0_CxGq9S5>%d(X3vATt&&vD@>5&)m#s}&T$;AYerMcH=L6mfag^bcq_aaG#h zqyfe!fJdKA@2dZ}yB6T|Q0IsLNoT5na0*jvxG(b=!SLtjA8gsM9Rn2hYwuj7YK&?h+>D>xV~uw5 zUz(+$jpP1khb&6!Fx!gPwS5}@&@Fq%bZA3y8H^gNsgXQ@;&NDXyI(dR z8LxqhUGQ{}0O!l*8ra~m%X)9ybD`^N78t6u)O8Gd+?G7=ASD2QYTL-ujUHN22|TUV zi|X*F@AVNb7W?G2;ED_ueZ2qhS8w6WP{bNk zXXA=-W*F|tsoekq%vomeq%y~kb%|0>9|(^UH)L}fVeJz53ho88f!%=IpAg3t{}ion zZGNnJSLm;hT)RI%!#!G2INLZ|Ouj8DK9~^nQ3`>4PI6;kd($wC$$;8Lz{9d}_;wS~ zi|JM9@HOpBst@E{=QEERpWl?m_?znd)*Z3TkgFYb;)FL_7N zbO0w7Kv-1)KqeHwsMB7!LWfmi}YO%XtOHsHNm|2Xo_%+G>B7P-YYM$g^V_~a%o zWkv)xS-C|FkFC6 z$liZHN@*9s=-&HW-e1!i{Jfuk!97%q+OjX{NVK4Zu)!|fI)!scCnQ&0v;a{$CQ$_G zWdrID@0T;OeIQ7n_>J{Y=lrdSx3{+GQf&pyRO(Z3D>zKrU$^OgM@1UvOA~09?wrXkUWpGyM1I2+dZoBWzF*b~>j2mZ$zIkD>w~3z}v+1>Trsw0z;n$;t z0%3hTrhV@-Lb4PMxa1t0y}mCkA+U6yBMmi}->KnVG5e}p@6Z`scXiQI^%C%A>gLm_ z;BcI#^HXg>bs?MM{mgq#&P(%jPu=iItvK4fe*(?dF-_tiK&7U7s}rwBI3s z`Ku>z+b{6?z4Y>PEOexGha6JuVE44{XdDu&YWjuvaU52g@y_Q+|2Ey2C5oL#6bXJm zZVl{SD#~*vNvZfkw1L+aMyE|T+d4Lx!koYtMB}=Lw`o3SA!6fc2pK=* z-x|=kZ1(yXB;W%W75EQ)Ufm)5Xxu5c{>=O-WEAg-#jY`7Fqh8W!YP9)EL2cAd5Ene zoL)AKjqY-Lg)syczd)s#WYuGfGCU&_Pi-riyS2)hI35!%!*IY;3m;u(;%^VmTf-oI z?W3kqB~s|;h(;`1X2PZNJkF*Ycipd}M93kI+ERO~<68FNX8j~P(eq!}WV&TcRUXX$ zh5pH+a*)zZOhgOeIr-vQVO?6F7PF#)N10juq2ODYngYK{DdBm+MHX|cIzhE(gcecy znbH1-t{9bf?2wIkalycNL^+;fg|O?Xi~3Bo<1#4>S%9@zEqwXAY+F4{(0jCo5Gjj0 z;9TmvUKOz-wBRVgnU6`0wQP_19zx&SSpDs-o}pgZ#~med5^ehI6uOenB-o8I6fGK= zx*86<64i9)M!AArL~Vwolrs7jc`j5Ew~d*8C-5fc&Qqu2ZME{ZIC|eCOCp)Y*jSHG z;e7GK**p_>T_^YCM=vJPaTaj;ImRysH0nA0S-r#_CF$TG1GEJYRLcEz`|xlD@b%>= zml(?X4m6!HA^!$C5j+5Wd%uvhWfk*Z>M}Ixn9(huETFk`Hcu+iJ%HAH?$uuwW8hI% zgT7n}TWvP@wAvs>bMB{i&e-<$4F1T^wx`#jr- z>HJ{{{eX4?c@b$Ckc6hT{(6HG!qdrbh+aZHh9>_770*M80lHa2ZU?s=uL&kT;z5P_ z>7$S)cv|N)=m}W6o=67N4pksR6aCYm_O`2SzH?f>@nLy@eyvk#r@PlbjIRgm z4&%&)%sYPFuXl$8MnqcS2bRBF(dhl@VMHRyCAQyBZCm1{?9cCNtW@7${o7YiG*8UC zI#h!2Y%&eIM2}nFV*BRDDuM*6F2WlEODNrZ!vGcUl-01Z7b`^Ei*x_~H?r{{0pC4P57&hOG#%N<#VpiK9GQl{ z6s~a`a(p4xALxlQ=0WdoubCzBg$s)MbTmUwSA-F`hTefWtusOLPcaE!=C*K!(HR}3 zakf40X+8|vo^!1E{mJD%JUq2av*A}KZat(!w@pp?NgGTB`$y_{+}Xp%yjjqXZ(A}x zfEe~pPE9E<5huEV8N+RJ=n7#6iKUQ&JU@7=NfI-D>0%3{$*5uGTTSgrZg(oyr1_nqu_OHRgkT_IA=5h=8r0*;Zy9Tz;#o3JN> z$QfF7%KMlN(YQ5dS1ppJQTK{%K{uD=-^r$amsUv)=^%@ozVG=MRfD5qEn4dtDvgjO zU8zbH9I}NL{xW;0zaeos2e#uQAw5{&xtH2*cw_AhbA|A7!SP_r44BD|To0{F5-2t# zT+x=1jdD({LV|I`N4l5fzDjZAz*^|@*SKNA*}(T%)8{rm7Ymy+8y!^m6+XkP;wF0 z%7(PQrk&h+5~LxcB(EKnDJ>)nC>^pA(`px^3w8=;sU9V>qTU&8P%ATEVQFqNF9DbPbbkb`4D1#CKx-3{Bl zE&M5S=B2E3`tNVpAhIWYlppU|-IPfUi$FY3zAv%Bt%uh)GVu2XG>}{b05*hpO+1zU>nP_^6lnEXxQu!V8DDx8U}enny>)? zAGj9AIQ+o}^u~K&aXAAe(f+bOU6P>U$qE)*M9J&v4E{i zbaU8h_Gp@LDt`CfjPsPi>D6%5Z0ZhOoM2jr7Q)tee?JYq%Eh3e%$GA-hMRJxU0Y`M z$cOysl`F4V=`0Kv0qcdlQc1G#t|ymd)gMT?fvgL2n6X({kRMZ;)e}ZcvJh)CW$f|d z=KxSU0c8I>6aokKyVsayKQfa2lZ+dnLB8El-RFCyP)`dR3$Kk5a zBoU&?=o|vg{ofg#e+%yo%JiI(I9`_}aR|DDSs5ktZ)CAN=3pL{K|QuZpsDYWU$5`i zK2sp2SlPeL4nN7yqo%4V2{R=9LPJ=cmwSYKh+|7F}wn*Bp}tR)I45T zzat-vM1QTo%0pmOp)PHck#hUy+-n!Do_gNjH>dHj^a$^YLx}xg@9MGe1|Qf~&UEft zMttw)RqF{TTofDCRzx63uGOU`X!STw4ppYh)3C_<{}ii5!DA)!)w*gq*fO<}D;^Au zlYedWIr}dk?Trof0tPihF7FZmp^;meX^=Sc5KT&+@2uwh;ik>I_pbfXz0a)fU#|y6 zvxP1%vi%(HrlYfvuXVrQdoql8&n=>rxt)Kce==p@6t4~mumhJ3f>Psh0Fq^3P9CsI|eDX6$l=3vowONM!o}}F9TU?NuQu;H*6>rVU8*H_SmhQ6^@T| ziM~=33MEvr)4Vz~zR{*>E4&)1gP->fff~yV;8>A1?z$J__U{$QsqddJ5|j>M_vrgK z?6#F0*p=xm&e)||WyILHS1Y&H&=%Lk*r{&+m737A{sUr_`PwvIr_H?Sau_w29fQRUx9efElpQ0l~DIuJDTDVkiEDw z@^v*Nf_|#8e%{lo%=gzID1h1!QK!Rvp_Vk*yDI(oDUau*ZS6%Qpsuorj$8manqMFh zh+Cvv+0u|#bp?1Hu0WPMSrpY(}WH8Wq$}dc+|-h5>L0 zm)pn|zk+D}wU9?!BHBa+^?uR8RE9H&BMZc8Ns&un6+IyYz|A#3@JIIt(UMCt=BlCR z($MSfV9?<>6aak00c1N?h|&{!?1{pGs+imFoq!~#Yy5f&sU#4Uez%v=-aNb_2lGs# zOESvGfkE(K#9xD;IWvgSeg99l3CJ(Vgu~7*%nS^|W$Op+9V81xqnL)(y{*bwm>!`g z8*%QlO{&4lpxSpTl6H$({>$?Bt)1oDGvnleeAioqdFJ}xa;lY3G(4|TyuI}G^=*pN z%rC*#bA;X|@H-C&^#bSkkhiVTB-*XgxhT*#1GP-^(&1r7`K49(kBjeY21U*1@55aO zio#qUrsau~(_H_6 z1r$`l;MOPDm-G_;p{dj-So~m~J;)e!teC$b6s(82lzeFB^XLogX>Up#yE* z)o$JO+1=QRA|xOx2ja*tIN{4+R_fRLpIW+ zX)?JSNo(J^J8#{i6ciHpg{&L1sLvd{2Xna3aI^g8^}4?_5gD{Q(Y_5e{PNr3I;Q2i zFG_P4RgnyXjBsbh<(lKcUHE?J_8@$wcGnl{|lebpEU1 z;W{kJp;P~t{qb;S>zIBeo(OIu;Vy^mR|LC_NykcL;zX6vd~B4*N}Z=Yp&lrtS|F~Y zl}$t8JD?GKF;J0r@r zM8R&)c=l~{w|UZZTzbsg5Q7{pdlceM%ZGRmT=`?xjqJETJSx)0BiQnuiXo(!BL(vW zMIr6?Cs&(9iu!-#MLmC#`-0kIk54?##`6}sZN4`(Ca_8$7vy+$>u4w>^fEkHi6`u- z`1{dr$;B6bkh`BK{ky-Nb*LEJNa7m;I}Xw?9#MEIpNAl3jhYZ<;6-KvChJd(kngt0 z(h6pM6KAIYG)nOQ1t>Jv%i|TeO-a0pcJe?dWOj{IYuKWZ>=E-5r6o#H9H5L>eieh4 zq7B3`gL9T7nHVdlo7{68i`)|(vyD|RX31N+##j~X(i?gweb}Wt?;+5pIyDr6Jvb@Bu!C3*`g5a0jx&dMwskP=y$+_vI+&K%foG1# zS(dS_ef>WG=0~L5wIe#~cbt6RKKWDI z{V7p3Peh-+PL3@0y|vGiS}R7p=-p?()aQw2$aq7ymy5?enRjC7?E8j3TZG@FxA2=7 z!f&DpKX2%Ec65k7&pPS9?E8j3TZGu8w-B2cjBQd9VopCHb~5dx^s?_8`fOodlitj0 zVlb~siFx(2bKH|@Ck>Z<-`3&bo=iIKn@Q8YvGB)9Z~i#eU0wo`KAxRVbVQ%W9oNu! zept(hV=i4Wi~x=a#mk+vU&O$66FesqyWknuy5+=+-UC|}JY&r>=V{t_w}JILG9=&5 zkj6H_Gwv;T#)jY-Yl6oe`flew%NG=`gy22#I&M_YVu}i4ZT;^ngvN#t8f!vG@4s5( z!hihk)!U0_7iT}ey|}vg=H>IBpFMwjasK@36bx<%4hPaB6%+8{@(sWlfLVrD%t+%S z;&$9>uANvaom&}8kw~}77;P-Eh2nFM2s~NQRGuI^PfiO$vCTCV=$%>|#Yaw#?5*>0|J_C2?t&0VFWZ z5Wg;ntugTpACPIwAT~81Q`hcp^K3iG>%EiQ%78fa1ETGu>+AnM0$111E?)5=xVZcl zZZKOIrFGD8PdWDEg!=PG@uFw99X+y0Kr*{sONvt)wIg2iCZ(*QI$Ge4+t>LwJ?ZAS znV#4kH;zr2b$Tnaj-kvtC1tj6pJ%gfeV)x4`fO2Vo!-ihu6ISr=cj(r|C_1Pj-o!(N_F@%UylBzx3h0|{FJM8<0K3gP6@7Rs`$eS5`mJ)=C zkD)iO6P!vwG8F+HffU8$hK&P?{m*x?sS}IXV&^8XVUQmbYedNWu3Q; zXHSJ-KJv!Kcuw^3?57Y+Ix0aEyAs3*wDq~CLNFhBzR~Bg*5{sHkIAk$U-ctyPe zz+Uw3vuE_#*ZX`@x4R}C!*?e3@Eu0HZ9IBv3iFZY7~|pU2sTKe4be6Fs~C*?l7^V&Ykg{%}K9*`O0B@ff2;NRgQ z0NXVBYsPoIN>;=1zqxW`?M_`9l6Y~aT!Wd>r4zkN*29R(fiR!Gj-r0zG_Yycrqa2+ zRXW#D>0Diwxpuos$u{8=7@`ElA&P??pee+$wL><2&F!tP zxrV;xPHQ`4pFB2e1;|=OU<{glZF!I>PnP7yvXR}tee|De|qPaZBy*k=WJsjJzn>Yo!s#N-2BdnT`#6#0z6cuOVdXPFL;QIXhwV<}63t&7J zd2J}pwkfKI4^srnH8E}uz5+pnV7yI4%_Yn?t|%fDY*S2kAYle71Pe@6ZieVDPer0B zUae570`OHnp=}Df!w$Z$9@B_jt2bLn>7LJNSRlnOwLt_ zfAdusq9o&mN!YSmtpky#7L(hNb|*6`KOtFX=rW z6~mBlbtRI!*y_o#sdl|JJ43OXn`D$Hr#t)k^epinxrb%YZ3<{F{gX8`R8L*=bXsVh z{W+SYgEoz`x58-%^g`WqhrZSOb01vR(m|VY)>}6-RI`cJLC-w*fYB}7WirANGEEw8 zkW6NiDLiBe0+iCBs`^c0H7H^zx*a-??KvKE%SqV0??KpnWVpS?`cRmrg$S9J+JrIy zBOJd+R`bv1wCeA(D%0!h^jbX@<+bUbbPKfePppA2Cs&w@2z2T8^_1;^ZGv@Smi+1qs z$&+)-QPsTfN!5uty-sZh)j8G0CW#P_dEw5O3~!PMFLA(2=*hgL>4{@8lV&z9;3$ zt0n;E)Cb#)l1*`r7{LXKxR_Ao&qs3lIx?o2l`+|}etReV8acnS=IK+R=zQ7g@#w|% zQfnB8k(^K|Qur8j%o_9US!1>g;NA(q({gms%(4J-_N3e6)dT2q?3%o*L%+^Y)m|3E z(s5_o11+W&eQMfQpPH8SscBiCGM5I9rPh?BWWj8@2=4d@P`p88D-Psu5qytQknJ*x zHkSC^sYMx@_Em%Ds_sKP_=#*IsxbLsXsJ zisPFbez$87LA=Rp|BJFNH^E;e%juYp@7we7ZRz;Ev+*ZoBYaxo#M(G$>{i(;>Ub-H zJDb@uv6$48z9#jgY*J53CUs33J@@*8Z3502)V%Jc>vuFIeQrwH)_F%0-4`Z$PARR3 zxcafIKR=rEjnSQyh45rF)yJ|nMp_)ppCyUtcgIu!-<}FEv53-1Ur}llnV6JBsXZ*! zm{_OdDsdWCiPx>n9{b+(-HONve)hmGF#zIQk&P;I`f$9m4RO7c?_JcwsA(}NNqOxw zHP_-Z!r7-RUxYRbl!An0bd{p)mk6YUP>{eZyCrF8>qEUD?_H$As8KN~3G%i_Zr-e$ zrsB=4nu@I?Mem9fMnQ^6Ns!mn61WnU@h(p+3Q-b~9W$MeN;yk|Vl!ca}WbUUzqii(&o2@Jo15sU+rf-^QQvisdsK+oi2Am0C%)I(edZvgLu3*D*BHvxjE- zwiqYBcZ`#7#5nnSjFa9;6{1#{GawELd)N zbLNxhcid8b)0V2&vHjk$S-ugQ zsfqc&6c_#sp9c|6G6WKsQs5l{7{Y{~P4Kdg%ywsg1nOcHJ{In*+kSIr4KYk^$Abb_ z92C@f=*4V>h|2P`BnBCU6fL(=lp$)Jje3RO?|DrKZ|NGd;pwwso<*ONWC!pE?jVth z{HSscN(l(oI0{8ceTyI2x5ZBRJ!7YMOLOD7^_`Kr853xHCWim>?UmY8LcUcx#k5s1 zYqFdZUGrm<46N`Cip5cq+wmC1wI8GSwkRsUXA~7{IX8yK(T8Vd%=Q1h%_vAxa)Uzz zZehx|7w>$q-jEP1Ar{AJa7#&o(hbfsF8%pPOuAV#?!;=*_?7@Jzi$ASKQa{9xjqb4 ze>Jo0ZeYrIid+`LqM<2*n+V4UgbT1uqYS{6HKg0OL`3<0BchC8d|!)*lD()W!=^>{ zRw4}@a#lN-`Ib{I15KK3(@3UxsB}-aW8$l8Pki+)o>0H9C)6mX<&SiQ(Vo6zFN)`O z^!U4WkH4+xR_~fyM#(LIq^oT9yd6VscJ!aS_E0Qag{|HNwv75({zzBVcs71L88)@3 zw^n2*MSeRnZ2CZdb)Za!*NzOUB=1XxDaYH9VH21=<)vp%iqnP+Tb-ibWr~a{MP7MQ z##S=wC#84cAfs-OSDq9*8TFIWzg&+w8crKB>aQ<3>3e<2$;d1kR2~gmEV{LfPv6mS zN;f*56!(ZU)8W|cI;Xc?=NNXKquF)NTm<-9NU7g1PH&^eF^n2VGivsbQa?RTZjCwt&cWox4G?P>4L5vKWHDRld)U!NNzD~zwTKsmj z*!W0)Hc}?TYez=Cr0HE+$fzvj6q2Ty3>z!EOA3~2t`cWIEi*=P-D(vt`cN}7Z+{y>8%p1bEcG>8!{Q&3JOB$k8UZF;CspV)y6sPWIV+ZZXehHnBVFEp}&y*qxbT z*M3<@$wZrXJAahPM~I?mr!FGf#@h^qdGEOYKHqUD=9g8KzF3l!jfbs= zb;{DLud*~ND=0HVPpWiJ_K8H6*mC{GHPH?E-EkJAIH~uK&n)`RtgpT^E9*NmL*J>H zG;vUIlf-7^j*Z?r#c0-7F`AVXqnV)?S;~|0Ru(dPdB9l1ahZ%s)38b21LK%bo-Xtf zXH=|ko_-?!6x*0_qa-B($}(9;TVB)_>NyDWZnu%oZI_YHEIQ+?ug*9t>x?r)XKd*l zoOcTkn2YFua#dy=HzrGqlXx+h-QqFkA{>KbyVxWtx#1B`{9g!!v6xu4Mf9ukvt3N# z2P|i=Q?%dQ7VI~(sM@o>sy1tAC=MmPp&H=Axg0M7FC5tG?LxcGf(`VG@6KO?4Ng-z zwUbWCGxN!bS5=V#!IwKhJWbs@&^TFuG z2_}ARZH#mqpJlH|{F)Fx7X=S8!(FLLtmKi)#>8|pFl-lL%`8^mtgqEKH7>)M85Unr ztyo{CuTe(RZ9qlQ3%=O--8YO^Y5}svP!&r##7gRQ%jcTg(z&L#8+E3=Z`7Ic`z5r^ zKh>_(F@_}2OVCxP%xc*70ryJ?6G5$CAqWp7#y05KWy@*Zs0R z<5+8U%05z*(IRvSi-_NOx5^`PTj3E&ptaZiCwy*p+A`tg3IW?hW|G5*yBA9FT=JR} zUIPXObPJn^Bm4;oKRQ*||T+^8{STGzlgQ4-UTF z#v%?d!iyB9JFdxGr(1L`Bk1;haD{oA4TuPL2r(t7cq?voXX01>y(C-{fgr;h9KjSM zkW!S!M}V$zmgBgE8CYy_#6@$8cv8m(;+UcsGIRmSC|DqRi%=}|E&-l;E1x-U(id3#Ayd%nlCzv0b1vMigbI;N9Q9cKOB6L+2g; z^qD3-4h}wo*C-(wrX<~gkAMg3eFSe&%B%tK@!;c7dp?%_$Nt43UgYU;ydQj+4i2u_ zVBicu@EwXa;H4ZEksW&QkTR76QB^ z+Tsvpg(xWa|A?fk;|+|rFgpH!c#A96;xC@_g10$#+~HXm;&?SI*23{2SmHFJqk|#1 zLWpC2|7RehFb-iF3akRt2wcR1?dLarF$j3W z?J@oGFBKXs7A(Lq=Lq8LK`}+nGWninJ>Wk4#jcP`tN|y6l033FgE1ZrP z1vN4s!9Nh=?$^77ad$O(>|er*uJigTlOL93z`;jw{XgI%$Y{zq{zvd`@aFn_@D6+g zSBQfAYEy8HH|RekMhvoMx)yhzf{)Tw%Ygj)8;8JeN!v|J8Ta#^+U$vHTU(tKC8wtr&)RG8b3>M<>WTdEOMyEz6Pau#H2MiUq_8Dv*u>5(<8un)r2h zX^9G@dgOFKF2Dc;4A@XY6GU;BN)Vtd14|qswvuTJ0>34xaAV?lNse-{OTkZUb%rF6 z!j{Q45@aLIROeEQY||lU+){K&t58xtlmmABL?igHepE*M>cEd6!WmycKMjUMxTWjC z(I6%<8vIMGNNpe)Hoix2i~vkme0ydiwrDdPqT(*j;c%OwbQnSkhapb+U=``M6huVS zGZR};fG-WQ0wlbSnWYQD`51zaU_l6*%y&x|Wr$J!T>2%qaa^6kVrk=8UM(0}QQXw+ zGhQ5E2T**2QxbD7bpun(aAxub!U7%Nb5`&##RTN@zz3eG9R)yn`7sIws9PLGY@G>n zof7GG%%@5E_q1**WlOPCG5Atf*IEkiF25crQa3FsmRsL}6{fcR{X-%+iI4+K#6T%#B)2wiIv2gR+mM|_-9Nf0AM6h})^6d-0xAPeg%lXfM}bgQI2 z|9~^TUF4~+oOt$&IRe+pQUd5h!jJhdx3CsSY{Z!6JPUz$IQ%)y;JXIqI>PZPMOoHj zFTxnek2PPp$yaS?Wcqpy8m7qWSn^VV-I3gq^gWJO&v05ES76ELPge=SQRiyL}R7l$o;$_+n6SBt#&CloHR}#q7%MnU+KMx z5zW?wR5oP~p_hXyBpyx4mMv`lv%JVRFYSWqns47r61J3vHFS64={be_7`g_%A3M)6 znY>(wd{3M_$JLRK=j~c@@gyZ13UPD~OC<-TEtOn9ipWZ+*4Y~KTMf8&ACdRC`!Z38 zD%wk~uH>ZDD=W3Yx~w@3e)F2sp!ZvIIVN+>>5%Vf&E>c{uDQHj$2B+Ni^8Ovt+fQw zbtV?biYIt7G=kY#0KLaGB9Vc5^ZF$N^pby3G`&gU)=SbKMy<{ z-X!s%(e05S@LL?A@`@bD9WXd$()4Jc4z&lTgX5bdK2~i9#VckE4^9UR7B?BVBvS3E zc$tIYEB;d2+)x(B#s5JfenkzNSXun!TxcZ9gl9|O?d7YHy*s1)7``mHOT;rGeq7^V z%@>(kTdburaTikVmJL`NF6j@@@bS^mbOo_kO5ejUWGb*&01LEaYl5cyOG*TGv9lmu zkNDy&+|kA!WV=lkJ*kje&vd#o1|EXfjVG|Z(UKiVO7Dq@eR^7%c2~nb3X2ED45B19 zFjjUwun{wrV{vd`a>#F4rZOx39a zI0Gmq+tu16#EcecWR6U3Ddd`qNcFe^tBi_Pwu}lptf<%w0sDLe-oglnYNd0VN;NtH zYDP$^#awfw%O#F6-PP=ZXK0CIW}T@|0upEZLNp4}EqCVp^iztK|0)g+-sgL8gbC-+ z#{r20l+f%r3)U#yMmSy#(T#Ac9W!%w6%P{<4r3Cc<0lH&5XRvU#uN|LFOo?|369YP zUy7F1B|d3fTm_I(vW=ok65+tGjW3q32)z`hUS-VB1PZYu7zB_=5C-&AKlRd}uhv1z zMo2$h;mw*+ncyj0mEqp-T1npjm93#SnVx!c6#C;62RaCi{pAcUrzh?bg_Cf+3_N!- zai?&xbc3;rV2Gx3|777!!;@ehc)@IP;x|*nu``P5bj%-aP?|C^#*H`jg|ai10axq_ z4rEJ77QjgKB%j#7sU`e(#_GZlK=2(&@qbv`h?!8}Og5Bo3Ny8Fk?3w9`$92*^;;~u zd0W3?Of(%406Fn3)vUQXCQ$0seQQtL=rB8^K)e)Kdu+_RvHNJ7gJI9FO|QF&kU zxNwD*$y9tZ zw71ND3^nhjxTC6GK4j>P`uYR%s>%5pS2-YUIkGl_oaBT zr{^>!QH0VxL&?N6&_9vdZc!xlSk-*W5Iqhd+K@Oyv;j-4md4Fkt?=mGG1@(RGS*m* ziu&GcZyjDnYH#iG!mQf( z24|SW-{FjL+Lw64UGx%=&t2mJ{uNIU5?_P0_#8yydjlrn@hNY3Fy$zLDaAsTX#6$C zks1iCli;=96lhJGFl5_wg>2A^(KLW>;0GXEHUZzp@CM?DucbaHO6|*tm=;OVYG;F6 zUbvkT?65q~KYOJ3C^!Hx89C!ZhF4>H@N-QaT)R*IJ26;cd8*lW>J<0sRm^ zLlL5=+PnZg0?+soWgq}v#oSh1Ir z1S3a8)RvjUPyZ^(W3AvY|E^9bzmaswX@;@RRv2<5uZO~_>>|IKn`~o#0`%tUn>@Bx zlkfbD-!9t4YfYl-rIC5(;!JeI7-D9(3Y{ktLoH`=aQc&YIXE5gYORB#0bhKB(}6qq z?O#WO48b&5qb#2nbzBIZy}DB8zu8f)ysGdxQTtV(0UNjjDauH6gFu``guLG->O6wP zBIQMMpJa$`6S;cBIIGckSWf+RzrEtgX7h) zbU+MYB9fxmR1f8c$4`X6pV`55jnvPFvX6D{sP7?;>**eW>xz1I#Z%i9uQ&x~hv52u zPQjb&bMVa}xIDYM`tjK*`0KB~g3)Vv^#G5@{Oz~Dg7e}7{-F5g+mvkNUjU3oYA*Qi z74fcKUMEpaKh#?uFeKa8fAfK&G=|YdOi{Xo0jk=UZ!#n!qOiJ)VOrn_L6!8oTh6l%m+909fOfuinQY45a~^y5y$i!|DA5lo;jSq}gCVD2c#G+p|8och-N%P{PZiUu8Rs91gcAMB zqTt1jY(?enoZC_Y-dWh>yBuZ39V+MQEQ-jjat3psIr_jj5vD~m6*|OV;U@2fgjw&p zz)cQ|QcL}tyrJoQD78?20shyOx*@QnKJiyva}wU3{3|F%fGtu4vmHoq@LrkcOP+YF z&VQM?egyC)At{A1wd_n4k+Ij8z?#aB(O!2#@nK(Y!Up2_uL{mcCw0VL?XiCIqo#Vx z^p+n2G38;w=8wnzhjmD{lrVu@xAf1pltk>EHZX!atN0UswH8U~k%$W7zIlF;KU<~Z zM&V3vT|deL7i+MkJ4!h(GtJc-!K`*Ibi|=q_`@Zpbexr;8AAhTxHI< z&YaJ7G447vo(`HMC=LZ=ktxEF7Fe=87AJ2hUTX4gtI8*o4FW}9vHqTBC}G+fIxG>w zs3Th*jYTr4<8BmQ6o)*JvO3b7Yyaf@i~pm{I{20xq7QJBL}(O|07jgVFea;ni|GQB zyOgU7bsHf^$4}?gKk9;{F8Q(Ly@0PCuU>MIEZ8DnFu%qDS^<{(zS+S>fhBy=F${n!s)ZErs`PZ$n%0G%C;tk4{{;h~-Qvvij zlAKA&T&YYqtay^tyh?-B7gxie<+p8l^QNB7C?!@w{R1aHS~S z;8-kBl7=YVpF<)q3vBF`Ob;nOQQ;x!Ha_B4D~Ku(`4>k#{WM-NjR~{qrV0;VasqRN zmnhf;W~|h2?<#t6@uiwvwhoPRJ9QbUMblQVwTo4%=eF{r(KfAfLj+~dCf`di7IuR0 z&2Sx&ZA!^z-@JZ##Xj9;NDJ6x9eDQ5NXOWC=A2)%YCmw+!Sp+AR!Hj2wG#Xe$IP@QL1o`j3gb!W51Y>I-#bQ$=wsq6ZSVC;te zIE0?>1Y^g8-QtK9qYb?DFSzVxj_cgp~DOmUc{SA*m{1B|qYGf~8_% zfaz`o8l9_vEF24WBTcNNsx2_60#hEQU4pWaJWt3@3*`dI|H~hSsF0j733X45$yr~K zkg4I3yf8_N7rXaBv6zRk2ug$xPKLNOZt@n9hdP*kELg?b1raXXOy+hkq3N*OWxJsO z-VS#K-=2-X2z)r1F1)~U*<0PB7;<91dN11A`Av1cPKZ_geJ2gA^5Cugv&2v9E7=Ni7=PrJ zSSc4kroTwPMcK9(l@6=l9siB>@n^F9nXb{#qT%1)9p$GYlz_hu|0<&kG9CJ2OUnyG z%P_Rg!9BYq)ULK*OA!otWP8o>R%{tB^-fjtIsk()ER4JwEE)cfv83kn`3sz<6+tmE zWSR31)tMCivPBuqdsNG@Y*_V+H|tz=5|{X(Tx>FjeX-=HZEPV7-yMN)7sCw>1b@pg ziRGn%D)zY4Ais<7-BBs}G;fU38b`OBLLE{@Hb~r0h@uP$U_9Zqe7UIJavSp_UKE0- z8tOy7B?ZuU8%0MTCe^zUnaac2JEBK`m+n!aA~ij*5C3*y+mLUhQ!60xzf~nH?(ch7 zVu|lYat$&)7J_WM7;?uf=Cu(-2DtLwhQ*f7D}-X2iSnEl3ac?z$xWbwtE#M=e_n~M zIxQ|nKa&6a?(zsEH^C7=n}qJ3;q*v4!j6jA)1#uyDU%Je0f0fZCQ6CrC1&HT#K*qp1KUSoR$6jZG3F5{3v5lW z`;KIkGgVO?f#6uHZJftIGJ200lqHFH7B0!p$3^wXNhHzc_{{?H9fknhnh9+iP&uxjU3mo^zU#-PZzg-4A7D>ZX*)~#|?cFqdUBYO~ z_whT`pLg{Hh3KXgH^_%Y&~rZ%XQRkA2_d?jT zgDG+nIb;l`U<3DS|-cQW-}gKS*XEzL?ws0(Vf#0 z+a5f^d9NLc{W^G$c7xM_ssb@M8YH6f%4Rp@b^DJuyJ7zJw|^OmxkM}AHrsp#DSra9 z$>@>Yh!!6<8qjheTUpNr-cM|>WowvnpML!rQl2QL95@OIC4e{0%cPess><%f-#D%i zr&R?)P&?Y75N~VG2~^Ob{DKlN_#SOYx*HVh4FbAJmKk{Z`t1AR0&*V750-WrMVmw2 zZ^q|NI!6`AHKc&Gl1J4ftns@_Iy3wqq;h2Ijx-p6cUSm7NYMBVr$v~-**maAkY6>k zVpG5itjM|~JF?|x8JUW>0^F_4bM-hNAbTZ8v`QaE8+(d>?>Xn(3T+Z1D!IvVtHWJ4 zgKDBaqiN)%ezuc%15;V)><_VbCApvf=2e7#&J&+*t=j5mIPd8;{)6mzN$lr3^>@wy zzsI!ggoI~%%Y@X_>`0MUTGY+swB(yDve4GqMVy~NqOUkA(V1yi&Kr<3W) zk^1YLmmU{EQiIdM5B!?F?{T()G*}Og2K@Fty&eDIO@>nWw|)T^|E|b&FNY5+;(($~ zt%}RM11W`(tz;utHGk7LsEW&%?W(7?1< zDvz>DG2uJADbML#oL;GKL68Sg6j`&B$z)!IKvo=;;hHjhU!=6ymPLzWFbcExTsn)L z&qF?Q!LI!t;TsgAEE_V55c7ZW;^Et5C}>dUX8ezl`rJm@OZA?AU$<7va7OBMzs8j1 z>;(%GUw9Rde7bmS=&m)%q-YY9EA$U7-cqdtRdDF}t@l zYJ#op$|qT+lDXQ3=t{ocvqB}5`(2+BXk~ROWUba_R_Z_vlm}gx3h6zsN`0j6ZB3Se z)^y_D*CQ`!->iS;h58$`PaRNC-LqWRzoL1TFm%y7Wy5_4t4OLEr#BiG6@lHEi=2}% z2tzlV2F`r3T+YYyz@G(Zyd2La)5RPi$MwDCNq91z`tJN>x`fd4{K?dVHK`p2K}y|B z7tp$Hl~)JI`ZljgBr=J$zrVq8sH)R2SfikLx8GDR+qXKJI(QP-9l$nGE8jJm^k-FX zKuhR%09(N8kqyyh>Ugbi3yH7!yC&kYEpKMaC&*vRGtw#{BY@)|+NvrMa6xX6JW>l4 zJBC4!pMIt(Lg&YI0~-u?kC@)Tucn+BD#j=Vx?HaPut5G32d>0sEPrA9{hGRkkR2(8fb zEPxST=F*pTG|&rxvgK2)BziPRRQoV*rp|$16GFeuo!;tF6z(5dY`j6(?Y+ z-t(23IE)YrrPQ1oEm~k!& zvoWaZn-RDY$2?sspVUA`LuVd=9Uq|Kke+ZaG_eSTT0 zdbmQg*r~isE!#hDUccmT`M%Z;m6|$5VY)(e-^wj&E^6N!&K2S4FR^+)0LzqYg#KLA zH0E!(8{u66@EuPwRM${RCxX7d6nl~Za)qqcJPXG0_q&7x=99pSCrSN^4N)i=j?&JG z^!1$oaTkVdRg}+5>lvWN$@lQVDvpjjCM#W3)uTq(o?WBhx7;|Hz1T-CgmULn{;dh6 znv*Hbw2RA9#DvZzbwRyJBJ`9o*M(%Rhest|djxWLM+MK-$T(B>U86^$#uzNO?|m;z zzU%FvWg&ZOXe3jdZr6y-xn4X~0xYyCW!cuCu-u+@U5W54!xq-(NL|XC@mPpZRo<61 z+K&JfKyap*77C>kkLrb?^J$Gr4}?KZq+6sNVl;l zIVvHQuD%fv_%x4JDGbmhN-+>A2VSe5f~103;#GF z;qb;iev(&GJN#FLrVYw6xI(sw`Q@8QiTJ*V+PmLWPGBIun{4nG2heZu1b)ZgZ zZ2))Yt#y6<-{p-ZuX*|8B@7V^)&PZ=-%P!VbvA5Jb zFm8Q0)vslFr(Ilv;}GBAa0?@5s=QYv%XulujKciR`~23%#$%5kaf)8>yB!Q6ol93756@|JsX*5Ij$w;4Gj&+%Mm?vC^NRx^mk%M-^v@lPfvD4hDU`C_^} zSo;(3p0gM?>*+w)wI5;@?2woBJJExpand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/storj-node:v1.56.4@sha256:ef14a6ce1ae316ff205538cb85f8764c4ef48444bc893ba4c202a87c4a783c9e (debian 10.12) +#### Container: tccr.io/truecharts/storj-node:v1.57.1@sha256:2e36c31dcd1d724a21960eaad66355e29246b7ecf973a668049c61d29d660872 (debian 10.12) **debian** @@ -147,8 +147,8 @@ hide: | liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
| | libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| | libmount1 | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libncursesw6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libpcre2-8-0 | CVE-2022-1586 | CRITICAL | 10.32-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1586
| | libpcre2-8-0 | CVE-2022-1587 | CRITICAL | 10.32-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWNG2NS3GINO6LQYUVC4BZLUQPJ3DYHA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXINO3KKI5DICQ45E2FKD6MKVMGJLEKJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAX7767BCUFC7JMDGP7GOQ5GIZCAUGBB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
| | libpcre2-8-0 | CVE-2019-20454 | HIGH | 10.32-5 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-20454
https://bugs.exim.org/show_bug.cgi?id=2421
https://bugs.php.net/bug.php?id=78338
https://bugzilla.redhat.com/show_bug.cgi?id=1735494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20454
https://errata.almalinux.org/8/ALSA-2020-4539.html
https://linux.oracle.com/cve/CVE-2019-20454.html
https://linux.oracle.com/errata/ELSA-2020-4539.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/
https://security.gentoo.org/glsa/202006-16
https://vcs.pcre.org/pcre2?view=revision&revision=1092
| @@ -209,8 +209,8 @@ hide: | libsystemd0 | CVE-2020-13529 | LOW | 241-7~deb10u8 | |
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
| | libsystemd0 | CVE-2020-13776 | LOW | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
| | libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://ubuntu.com/security/notices/USN-5352-1
| -| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| libtinfo6 | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | libudev1 | CVE-2019-3843 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108116
https://access.redhat.com/security/cve/CVE-2019-3843
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| | libudev1 | CVE-2019-3844 | HIGH | 241-7~deb10u8 | |
Expand...http://www.securityfocus.com/bid/108096
https://access.redhat.com/security/cve/CVE-2019-3844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-3844
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
| | libudev1 | CVE-2021-3997 | MEDIUM | 241-7~deb10u8 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| @@ -226,10 +226,10 @@ hide: | login | CVE-2019-19882 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2019-19882
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
| | mount | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.netapp.com/advisory/ntap-20210902-0002/
| | mount | CVE-2022-0563 | LOW | 2.33.1-0.1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| -| ncurses-bin | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
| -| ncurses-bin | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
| +| ncurses-base | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-base | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2022-29458 | HIGH | 6.1+20181013-2+deb10u2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| +| ncurses-bin | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb10u1 | 1.1.1n-0+deb10u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb10u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| diff --git a/stable/storj-node/2.0.5/templates/common.yaml b/stable/storj-node/2.0.5/templates/common.yaml new file mode 100644 index 00000000000..c1a366e1cf0 --- /dev/null +++ b/stable/storj-node/2.0.5/templates/common.yaml @@ -0,0 +1 @@ +{{ include "tc.common.loader.all" . }} diff --git a/stable/storj-node/2.0.5/values.yaml b/stable/storj-node/2.0.5/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/synapse/4.0.3/CHANGELOG.md b/stable/synapse/4.0.4/CHANGELOG.md similarity index 89% rename from stable/synapse/4.0.3/CHANGELOG.md rename to stable/synapse/4.0.4/CHANGELOG.md index 4202046b22e..cf11f902c78 100644 --- a/stable/synapse/4.0.3/CHANGELOG.md +++ b/stable/synapse/4.0.4/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [synapse-4.0.4](https://github.com/truecharts/apps/compare/synapse-4.0.3...synapse-4.0.4) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [synapse-4.0.3](https://github.com/truecharts/apps/compare/synapse-4.0.2...synapse-4.0.3) (2022-06-14) @@ -88,12 +97,3 @@ #### Chore -* Auto-update chart README [skip ci] -* update helm general non-major helm releases ([#2759](https://github.com/truecharts/apps/issues/2759)) - - - - -### [synapse-2.1.8](https://github.com/truecharts/apps/compare/synapse-2.1.7...synapse-2.1.8) (2022-05-26) - -#### Chore diff --git a/stable/synapse/4.0.4/CONFIG.md b/stable/synapse/4.0.4/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/synapse/4.0.4/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/synapse/4.0.4/Chart.lock b/stable/synapse/4.0.4/Chart.lock new file mode 100644 index 00000000000..433658f1931 --- /dev/null +++ b/stable/synapse/4.0.4/Chart.lock @@ -0,0 +1,9 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +- name: postgresql + repository: https://charts.truecharts.org/ + version: 8.0.7 +digest: sha256:2b4c13c14e572773165d89a3f24c637b85e6f0350c73bb5ee029464a014327d6 +generated: "2022-06-15T07:35:27.959878718Z" diff --git a/stable/synapse/4.0.3/Chart.yaml b/stable/synapse/4.0.4/Chart.yaml similarity index 95% rename from stable/synapse/4.0.3/Chart.yaml rename to stable/synapse/4.0.4/Chart.yaml index af9985895e2..96ec99614a3 100644 --- a/stable/synapse/4.0.3/Chart.yaml +++ b/stable/synapse/4.0.4/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "1.60.0" +appVersion: "1.61.0" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -24,7 +24,7 @@ maintainers: name: synapse sources: [] type: application -version: 4.0.3 +version: 4.0.4 annotations: truecharts.org/catagories: | - cloud diff --git a/stable/synapse/4.0.3/README.md b/stable/synapse/4.0.4/README.md similarity index 100% rename from stable/synapse/4.0.3/README.md rename to stable/synapse/4.0.4/README.md diff --git a/stable/synapse/4.0.3/app-readme.md b/stable/synapse/4.0.4/app-readme.md similarity index 100% rename from stable/synapse/4.0.3/app-readme.md rename to stable/synapse/4.0.4/app-readme.md diff --git a/stable/synapse/4.0.4/charts/common-10.0.10.tgz b/stable/synapse/4.0.4/charts/common-10.0.10.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b39f3b3a8f32cdc206c3bbba091c49a15329f972 GIT binary patch literal 46486 zcmV)>K!d*@iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{cy>x9z#s)0XXMCv(^BB;7uphmY-~@9yjz z2O=Q}V~S)0pd3v)-~D&+BtU`^Q;g!A}M zcmMQyz25%bp7^)d>y`iQ?e7l$)ZZHn2ff|hUa$YBUVpGR?EMM!?g5v|lT!xCpL(}$ ztK7NoluqP&C$RYfRhXMXL=|GgtW-nXdl$ z*XR9Cf4|df_kL{6Ax;>?2_ga*nnN6q08S?9e-(f`DVeqaNFeX8MF0SD5*O%~D#+pr z1Gdc2NTb(UXk7ZePOsDNwH{{t)%;(;I7jrJ1i;Gq-|z43?j4lp|3UxYasEHV^8~cp z;9Z8252tSd%}|IZI0RvuOz<=(kk9qj6YyUVn!r3}yzn_fV2tAQx|L=qS!Bt{98S@w z1%QBcE?_JHn<1bIfH1}=VF2@jEdU70Qi@qhmLo8og`|U1TRx~-ZCR@+T)-fokPJ?> zVQ+VTIOwBswANeDM6HXs3oBNh6(yPha}pR z>erZ{DX&;h_X2i9k{g%}pxK08^gF%Ipf~9Ep7r-My$8Miv%SOUU~h2P+Z*=#!~XuW z-a)wA?}y{TV2@LIZx=?peKeRva1tFJ^arpP!QChvKZA#ZCOB+F>Wrjw264P8rFFe} zLL0~p>8#7IhviUt&>41mn!E=CGzkx)gZ+MV2zU4381C;6hPwy7sNd@!^w4hDkI-Z? z8KZ+f97KEl5I!3m3_~;+JnIdfd55^v_D0lA5Tmm+Wt&o0*Q=+lf!vU~y8L=r^}=G% zA5R9m`;as7;j?f!9uJ3m2jkv8I_w?pjt3C!!?3>_A;j5rFh-Le?DzU`+#62%z1_nG zZP!!xD87bEs^}V~5u%7J5ZRQnMa_EJ@-l4&z9D(7DvcmIEWFp*D_FR{J3c( zgJ-+r$=+~qa2TOyhbSB$?xOLqH`$F2_a_t78y+5v_a<->?MLBY_$=DpKY)8)7OpnG z5f{Ta!wK4y(y~@Pm5(IUh6I+-*1>Vey4&dwI|IYK&rr0xci4kHg!XnP2XL}~*q@+i z80}5ML4P>x@5Aw=AMW)LjL`nG-NW%5c(}W^>CMD$O4*bk`upaB*VJ4g zdJE`Hg|Dg61fHwr_By)-`wrp3!Tu0MFd8519>U@N!SG=CtQQ^b?e6st4)^=f;9!4n z7*2-!6EqnQhG@5Uc+i^+QE%^Hf8aGJD$Q?1>NzABM&nKCtg6)$S;K8eVO4xBB$u|m z&Oyf*4+oQj@v}p8*pK$2@$j&BINlw?{$RMjxBu+muzwhZ@L)1H-0L0g_j{A!AsS5J z-tPW*98P+ZF&eIKdo#kO$uzwIVP&-ygjH~x5>^&p3&|nuu+!^2Ge&U#V0aj!XfT9u zaCk7-h2uRGKAVi6!Qlbw?~mbd{49cl-Di7IICzG*8GHzz4F|)+-QnJ(zrN|Fbe+cO z7{&!v5Cbp)=>idgBP1LO(j-9>{0XEJ@oSRDF<(5ZCHFg3+JVB$p@dUmF2~MyW zCtv`0Yr-fJ4weP9eJD2$B6LR z6(NcVia?e|R0^UPhmejye+2{O*_6Nt0m=wuXu1?dU!?@RFv!py-Ul4Xo=Dz0Lm@$s zA+V*S<~D#y1kTbp#>w=37D1-?lEXSzy*Wo-VDFL_C`JrbK@{L6uor?991OtIBqe<6 zV9LK~{Q1-(HVFR0>V84vQcH9A3FHY}KpgX_Cu&*0HvvO)GL-yX9V6~9Jg8-WZ~>2Ng19jl_F_5VjvR@E`gwPY&HPi9-YgUTk=C$TTM}d zq}8N#x&k0AsyWPT1vY^(H8Rgo^%Sxh$SEKH8P}ozg~B`^rWoU(KdPEJK#UUmff&jy|T{$Xc-zq9WJ3GS7r`W3zZj$Au`7aqTqUlIH8M~B&Q6o3P_$%aE;jvTwMIO=B7@Iv886I z8-k-O!bt&8{B%Kz`3rtY3H~RC6ob<=0!KMZX$WIPN=t>mM3@R#e{Ic7mD4mTD)9L; zhd7aXpfWKOKUx~)3MY}6T98bI*5^g+HaRpwVE###`V}XUrD%lNtY)VyfFjq%YXH-N zH^&K{=W_t(X`V0+S(z6q0ZhSM8e%X3{SvetFz0R3 zTozy;P2y#xlz;)r6^a0)8ZX(9`k~cVVMxhUyfy2g1_~6N0G*|I9PuTYv{fVD{3}3O zl9P`ij3TYHOMpd{%IeO*xtJkm`jydQDPJO5bWBnvtO0KQDyy0g5y{aGfD#m@TI-@n zX*zo?Z5E*dsFd14;4%>e$8k;>B4=qVEp6-fPdJHiGOcATGKOJehT?^9%SIeV9rFnI zo3qSIG4PZxfR)IWXg46sO1|N$@2IMeEij^NSp2qiq65a&perC$wEPCx=uVYks`r~C zXH%&PZ#AlCxfl|EhY9~!s`LU)gtFIcO7rnQP{_&>Ddv89Yi36=^P@<^p?c0& z`=`O-B#iS&F%KN43nO33f?BQsC0xq_I#!NHv7L0Ck}J7vGFHFv6aqdgI;*zaikhC8 zS;y>7y%l^dt!VsDRV_;+vyRhCaziR^z{{8%Kvki(WEKU?sy(vE&LwP006}w3Lq!C( z%ncbVcCWpVESr2bVe+VZ!Y@uKR5@M8r*T?0tl@-YrEk~QT!<-uuOOQB#b#okjT z2O~^S$l@h{jKOfGtWT~^)M5@N43P;8#n_(42vRdYLS& z>H7wX^}_;_G!f>yS-Wt`r-*VUnUHG(w^B->j^m826~bH1pKrOPLIyde|s?k zKYsoUI%h~QMTg5N@a4;otta5v6ltm6%a!&UnEi^DXJ}&HYvnJ$x92cxo0Xe*uF!JC z|D#{OsDKu$x>qEfTR2R97+%~Jri~n(2)?|6LqJ*DLNRJXq z76O00iZ#Ttu&*OiTXm*V)b3-+I2R0)D)nImz=Wi8;mOimWbIRk8gHeGSotv8MIlFo zb5Zm{N^oUOO8(@~$A~lX3ggzXNnyxx7=s8h$OY0EfjEVcFw%^jD_}zkC?hzTzJLrW z7{@Tt>uSKVSR0&L?Q@{EhLb*+jNp`Dwgh1esdS(fu0F=m7V~E;_n>GvLs8Bb*t*^^ zuO{_1SK~{{(7c_b5o(773uld9u}jyY+}c|@ejo!?jAP6EG+^QN)ioqhJA%m+ku<06 z0+BlC=o4S;VJ2j!Fu*AiQl<3-WUfq?YGF(eyrRNu0;V~Z)&u0Erun>ZDRP0YK~g?b z^bfrt{B4F3?KVp(dn>iMWhXDwT&yLcgldJFf{)6WdBug=Z^?B437P!gq#Dj^Hz za0v*aX}mxnp>djC zQI5n?pTi<34MT}b(TdRbqJvU5@~Lf;dHE)&!r_zyn?qVnQx$@+Qa+>H~iWfhVG|%*#iTji0Sr#MC3NRKQG-Ii9$1^Sk z^@MzvoTVvygXtWyaJCuN!kt)bkz%C05}ESrUG$OEi8?QGbXD?CB_pJF2fkrb<7m7)Zc|LIxRQ!HI8G>Z6r^2 zxO#;NzzJri#14Rf&kjC+@f-oj08S`_aV&fuotFA#c6;a@w}$vy1w~kd2jp@$QgOOi z*mYWJpV*6mjwFG}QnXYQ602B_12=@Y7$-}B8Jg1$c*&b|N^6JR3@#ABT$*1e+jGg#gS%e*;y6BQQjDL zsAf5OrEMCckf8{C)RYt>u_MuxZOqa*q8g%#`_j_L3%ibUfWUmDOe+Bi#xGC|m**%< zlZcK$zo))th+v^)OYgaaOmk*F4AuJy#Bom0#f%`z5$0ctIE@J68}YiCW`1TjpYMg+ z4fIEL--O*=vfVMi`+ znFs3qlPA*EK1VR205dS-b~2d5Phwj?oq*w=cYDwK!yaE1^16bJIF=yKz!*(Z!fiP* zE2w`))lZ!LUaKW7R_Mg{xl0c*wvd7A84hQ1yBEj8=TN+H7b8DXV1Wg5L@AsivmUr6 zm@$-ebaT>9TxBK_B%F02vOcz9hP!;#AEz*C6GYRTgot*z3AyNZpO^(vyT8rXR|<<$ z&Voi@oFowr`66SMUN`SZv7w)(SU@X^lD(uuO;rLRL;yI2X(Yu;Ia+ds2gISC9 z279oohDW6}4Ar@#7@al2IX4KgaAGQ@Up${o@Fxjg>oz%bm^y@TPjq-d8ZD%DlBFgv zA;6W$0z34ED_-^0Y%HJSc^0Fs*C~v~FosEp$o3B4KYvm`ceFeDu$>d^kOrrK^cyEH2lGY-K4h=p9LG!TAhtl10^o24CcG%tJ6(nD7S62#jg!;G-VXoozTE`Y zdmNromwx94!)<8;F}^oe1$?M1RnUl;w1HYEg|&(y)AFT8Gpx}Lf);C3g9Yb?+Cfsh zRyEY92ZuQXh(w%QD(a+!jY?&?yyg91X_&?x>)Uyr2^iKHqK|xi^l?Z2d(Qv3I6hSd z;QJS+AMNULDaAjjMO6l`69Df|em)UwPP2BVvC zVh)H&-?gwMj)M7?eNkcGtqu)hiT5mhH0JSM~+nrCd$;ly$@C4q$Vy0rKc_9kc{)yFwuQbb_PaTLYZkRW>mU*S(Edc(gU@u@-?F`LqftS!rEsm2II z6MSWVxjLjW%p!v!(qaD`VRITxL6*^8Vl%Zcu?q^=FgcZAmLa~D=kWP&)pXI8iJmQL z%8#nO;xM2YNhjFA;9AVYEgc83?V!VPOmha%r!1u=@=>*plBk_irH3bF+A0~==CdCs z?J=Y{bmOLV+y4?&pWAGug9Erp@(gqCcYGt zRHFV%O2t`Efs`9xpf$7zFSjf%c}P}h__hj1?Zjry>P0GpY*rw}0TlKx|5U7a3d~L+ zn{_}llz`c_=sNGD_gLtPh}+BDq_pyXg1|MKJ0^McFZyqp>t-x$kk~fA`DN&&VUgzKpdhyMua*0 zelGi)g9AP$E*rQR=M~C0g;$u~?^R@=I*|txTdeRtAQ?!<)ttnh!x85}xsrW<{u79h zJi2i!JKn;!YRk(OYEAiOJ-sjFO09b_G_m;&RvK2>n=UmZh#yt7e*Id*WHR9F6`Jtf zHR}z7pl`)tYRdz5r6Zs}7R2TU6Ot9&vWeVs!f9ct`#D%jpj1h#i3D z8C$-GXBcl}LxDp)F&m5lgE<9v?vip|}O*95kYgnaD&g`;zsPA=IDUCQcz z{kWrws$&|wMiJPu(AeGqN$OM;MyLot5*xvMvdmKBpYWkC8?j-?#Z%knZ55An4P~MQf^u;( z37}7y3YH9Gi03=SD60S@^PSH$XH8=5DCt7S9ENCondYP|Kw3DwS1!XaP5z-TSr9IZ zj}Cy39V?3k1T-JFWjI$tH6NOlKvc|7?SmJQ`ss6y zd@5y-z&T=w=v5eJMJH9(4j+j$L&?jZ&h@z`ZsqZRE46=8Vd4$6*EuH?G()uBdv@pepGbcENwoe!QtTs`AjtTrPgNosMUNdJ zSVO4u8qs1W6aQ0+jky2^RBzM}6jMXxA_PxBUrvzkf;AS9#OajYkT({Pbb0kh?s#DC zkg^)hvs7Geq-e8pqM_@F@Y#XhIoExadMvPdt9{B^F^?P9wJ zJSiO5Bl8Mq-<))*>C%I8DU$%9ko*KT=+iOi&OP6)GT0u8xO zpweQgVG{M_hqtO*MZT~{{;lUf;dCim0d% zQ6_9t5NU4vk}ZNd!sFoJz$@+4aLIk*>S&4gMck9fGni9E%nlha(L?iPdrHzg>&};L zQ^d=l$%HoG&SXLxvSu=&x93Zl{j0dZpfBzdUQd17g5w=Ccl{M-!D%{2{O{nA&sT`D zH5)qCrA__~M0kNCk$(}>D}4)!$bdu{OhVLYNgT!2kWM2?RSruLhau8Y z+71T(R=l*gI09#nBM{%^zJyp|KY0S)5g<0jK#VD~u6f{V^gOGyV!bw-Ol*eE<=-2$ zKlmBTU(OC*I72XNt9NY?xT>iBmP-)1zr+b1rU_*PVvzuUBZEh#bHvHCjTSPrqzfs< z(?p~_O40~*pCsa%h%+%u3n!VYdgDZTO;FRVwP6yqVZv}* zzu9i-zdT5?G)v=jx;)P~QyMz!c+Cz!fwwjg)dl^R?Vjj3GrPm`hpsC}9N4w_U`-u8h&-)XFk0IZsY? zaIY*>qzk=+B#tnO+6sX-O9c-i7PbWrZ7%V|pKT~H?{2rOewcB^nU#{c-|6>yQVJMM zr6g;EK!<6D={(TyuCK2<&U-f#q)t_!H)Sd4%B!zvO@h8o%VakgwZIeb8v;4a#Wg#Ap z6NU)*v7qsf;xRf3w3E3*LgCjzKo*aR@?#+81w$O#RZfq^`i_|FV=Gs(IXEq|f9iZnGICk_ld}X+9H9_e7m!(gUa>}V9K31?$a^KP zJ)Fo(5>14lz*sFZ7mi!bT=Dk}BkTkbgHjkVN*0CJuzIB&sKf#n7m`E*^J>htT0ILE zADc-mmvyrAD;%4%IMp3~@1EX`wndzMy+xMr|L<@V)Yl{xt68V*JKtT{e1D;`!@%hk zv^>f|30{wSu&?fyVp-^G85$@f>%Tp;&A0oG7|`GjUvxD_>5DPaf78GBeD@^G&G=4}*(ieC#Tr(%d4-mM!7D^LABEhA)5(Rb)@5sD9A4^hb>%=-Gm^jY_eN$= zmsUOcl!>cqu=Y4-@%I+v@$w#Zy#wPO`{^5kA} z*a*M`O-A5ubJ#cy*guM#Heh$Z-#d_eU?pg&@Ihh{ifq6L#gc!1mfnH#Cb3&>I;=ruGAxL>7sC22o+BIJY5k z4tsz0ns@tkdWFRY&K+(9(uGM0A(&@sj(tiKK-F?#t6s#ZKGkP3J}4`PSLpt^!wYzq z?5g9|EjYc+CPso7ou%>^rJfih%{dQ<*NM5TO5EvmjoC~X9j9q@XOlzYuxfG`Jnv&6 zVSwM|>@YxYG&@Y~dv-HCdD2pOz-h6`DAS;eGj!Z6lWlSoCc;^rFrAVqLK#Z9(S{M_ zpwz7_DP>#({T>$umX%vtY7VWNx||y-0#BbFH1=0C4hf2ApqV~&@3ay*$6x{wq)R34 z1!E;CL+UK``?J^Q>OyKuC-5 zs@SY!s_+AMElsBBjk+c)Htd=#{7_x{)8pfRq`K>x%cQzui>!NDy*RkTviN3g^m@JC z{@$MWx7X{H|Lq;@_W#u18w>}%-Q8ZV|EJ!d*BkEt3H0u|v%V*%43adK|rtABYPV3Lz zFJD@pKbsh|fQ22&fgQ00+o`f$0NSb!o&eDKAnl-OoQ`4K!Jm%#ic4Q3s0tF8Oc8jB zlL&p<0Z*|&boAU*#-CnRnsIKT1{_km-EP4Qt3}rc1XqW&6DGJ5CgFrH8W;Vbb%m2? z1k^s%k+{8^8zwJI{@d0ZF(@Okbf7c-)c*V#JT2cvEM5wndF%SN5|u_s++M7D^5x5q zqMIm*bdO7aa*8z^|GN3ljb0eve9qg?n)$zXaB$$x|Nd~ecknp>AL3ax86^)m6R?;< zzKLfQkacT6bd-gl3p`aRYxSn{=()(Ftt*);EN~)rer;T1JnrNS$GT8QfeJupy9{3V z!xZdNlO4ItYt{lUTC}qj;gEqqE-`{K;O%Wgz^6Ew65hU?=7yL$ZSWOZ(#qREq=(#s zBDN7n&q44sNh5TLv!Ljw>fqkquGM$xcobEHug@wE*-X6e7VlKUB~W@CWgouqg`WM! z9#Fn?a^&!obYw)@7wtsTOu=7YWO4C*lKUF6(6;yo)WURr`enNun#w}+Q8Q0fmRvcVXK8xHA*xHWgGE08!LdG56WHwrMU9~77fKje zW+^u`c*m~MSom#FwQE*MLoK`db8opaA*%vO^;$>>3$i^Kp0BE-8&NFjp^rUhwv-5{ z7VC&Sdv=euZ7wMxbOSgm*b7ep`d!V1@=UP4mjtJ{-!9PG4S|ELLerMN9kYQ^MrVB^ z_9n;rhBAL6zGh^3EhvLuE-p?>5}**HN{R-a$?HlN2Qhoxs?w9i)a_2GF&eBKJUx0a ziNIEwOT}<*gDvmaT1-)rx*i};E25xgG6`vC(LjkrA7Js#1DKoNj{UvpD{I@x6_0H# zfws)Hjlcl-bh`K+fDZTrBzz7f4D9iSHN0ZGj;jYV9->on$H%CRKfv#K%G99CO+itI z54HPEc&f!W-fQQZ^i+Jdgz^uIQMdcUV)Vn}hecqaARCq7C7^8^)as={d6iIO|A&aM z?j`@P^w`{LA+W~&AM_7)OZNZ4;9&4*|3AdD%KqoW-;uEbauFbPwUrNAn6j0*B~KPi z@;K&y@j2GEMa4VeGEh>0xA99FM~H|*Ml8-C{S__i3kP=o#6ZJSoxig>I`hS5_ zsIHNY-3B+3_@|)0xXC#UwynhZbHXRZFfh2LL4 zYxMu_V1K`)|Mz$MyN~++As*rXKSPXQv_K+cttT?jo+Q~g6yxGWFtzq#VF2S!SB5&W4t1JiIQEN$@35f=m&cANu^DX>xv z6*OK)yCSajhQzb<-8V@Pi8>La^-LGwL?$4b75Azb`-p-uq$tu6z48_a zB|TP2QqfkYU^wsYv*b~$l-YgMev0m&!I8Muv2tplh=x^Br$tu$;*>oQ7%GQHQN!=< zDx=&n732z^tCIhQ^VoH8SzsOKm9ZGC&Q|dYM5Aq+P8EQTs#8QcQRp*sxsExSqfZ)$ z)Wi+})N!GPy)S{)?!Thr3Y^DfXSqXqD>`9~tg2TefG)zv-9c0(HtoX)li_gXSSskN z2hzSRD3C2&p(1=hv2dXMSAof=6o8=3UoSKMTApbRK(MfIQy6ToqFPj)3_7mDqSVT1 zrUM|{>1M`IeEd+DJ?r4q5Ud2LaXUb zMW{CyEa$S_jL$z=*>u=0apxk`(Ld|?TL$=89|W51YHZ8pP7#jd(n&?UwB1c)L)0y` zZ_i7qK$70J#i5F0WnT^@M-ySZDdad>O4M$lw%w`4UK&r+FNorZEoXu2x;0%oG!W*VXfa&RIeA z^JkLg8UKxv#mJ62SEtKX>lt0hR`W24Ol_gfieK`iw6%YW8PY+u7`^ z#wkr8jzMrL_A*T>I1ad595c7lWB5)6)`lplzeEbDl{6^@@L%nKrwi#ntMvWK)8WPX zFc@{NUqf=v+Z#ST)ge4LH56p9k8|E%=JF^yR}Y$(6z2~F1~px3gP`3O#sL5GR;UK5 zrCI<*0uJzp$(vvW42yB~nPgU;TPvxD+V^Gz&qdIe{Yk}Z=|$i`j(lk-@dTt~1-?_v ziUnNLax!B^)6#0i>~N)7(FwM+li`vyW!(;?v#v~#Ay!6>C&GykKzqqau&bzu?oz{-d{x0bFDM^#>LEueUqwJ=%W{@fiD0=a>ww#E^2_ zsj>cK*2T@NzluAs{QzRzb9}E+e3x%`zZ%W>n11JF1g`BDFT-KUZKSJxHam;CSVRptM|&R-47@A}nWeU4xKZH?R4E!M>8>(+2x zz8m{|0SI9R$2i6eBPAVS6cxF8-@d%KJbLlw6p8tH1r!M}_ z&T{#{!GF5xRiS^DY*-ce=gEP2w^4sSO?S^Re+79~M*KB2#_Q(4&ig9tKY8Enz1e?z z!$Eoe@9jO>e-H8)`_Im$Ji*h=eZCq%$1u#Q32aJRd4p-A`yxmDjIr!879pRPGA+cj-l0y~JtbM_ew1H?#f#MiTl|^e7|E`7 z**xo-@5QY|b+(8>F;1_rwu-_Sqr{{^)>$Vy-b_RQ(2&3kDH&k-xV@X$R(n&E&ZG_g zk&Z9TSUKh>5O=EK(1p+I$Y4PyS$bPsq7lzhTBMk_UGMVwM>_Vk!=KB`46@nfrCM>Q z93_D_hs(c>7o(BD;sbry$S9CqB)}y#B0bQKV_N z^;*At%(H;x^tE`s@nO%hi{egBeVVQ;?(3*$N#)=BfzOQ=uaRbCU`>$7?|NZ^J z@X`PCAWxnB_u=&IS1|n+S>jlIyiA0t(vu|{P;lomL#~2Gzk?vnP$EFBu2Jj!m&g=Q zfZsYX?OkJnra2^Qaa_})4ad`FC55Zk+*o9ZHZ(lQ6qnjt2~z)k+})2)=~*TJ)dc8X zO76V3_5YwZEZcvB!K3~6AWxnA*T;e6&;zXmpvhWNT2IHAGLTNZ>*^LvB2g21P8V?* zDxJ?0+-P&bh-LqhKh@`$?rFuZnt#9rzv=MC>wS9r#7?@q^sbXRJ?ffo;%OxR?>Ya+ z!Tv!x|3`oKG5_C#JeBjGcd-5I5s}62ulnfQ{8gXU?EN~Wnr!_#6>gX8V}rnN{pS3? z&oAG+d-4AD%MEsoIrYBJ4P(wicePinsBr(=#5J1?y!|U2$LH6Wg)_IcS0`sLe>-~p z+HNg)_cpMKoV|O0@$$0ol;|G}I{p1luhZ-H2SE$C_vFd@N+mICnBtR+$5S_s(#w<6 z#h#0qZ1(eKVR5MoMF&2*)C{>95y)lPE1`2^;_rKizh9z$|0dM0=hBo|cYImsX|bDAL=t&#-^y|sr1Ux^ zk)#Yt7OzM;m$3@cf;&SKE!j5q$!alg;a?4jumT_KP@Te?(V;U)P}DI6H6_(;{o?Bi zX0^N>&M+AtNhSV*+dH~ulVAs4HpUB-AWBb3Iu;E%FPg?XwAZw9KhYG8?7#cX|IynY zRQCV(29NiDKge@G`9I35#`aAUax@S(Pi=9tL1g#Sy2$Pir*AKh-e3GuxsFdLmnMR@ znb0+NC4J4+@T&Q5+|jr60Ir??2bKNb;qGJphX;A;{C~gcvA+`!pb{Bt<%YEZ;`iJ}j<0X~9z1+jw;P}7x}))LIR9_u0b1+-=~wQ5*xP-~|Meh`(f`HF zx&sf8cj^>AAoJPh1u`Gk_<>60ns|arRW|Vj4fhXA-XQtr*8ZSkQF8wB^yuv9;@z3! zG5Am0rEqe3arD#cm*F4az6zWjg3uiw9T`Qq)%i{IXz{d#_Ra{6Jf!cJBA zCEEY%`>Yz$Zofpk##C9)%-@9{2eHtyU#_RUe;bd^W>3Zb6L&jwFMml1{wLSn@o5?z z9Ac*cQUJj?&XJH*Li^4PQ-Cau05og? zQgO=%1#AWxfCPb%AjnYE$|+8!YQe}k4a9g%AX%<7BIW%evkcl7hCG#L!Z*5izNpOK zZhU3EsyoY|u3EsczFQYP>bqYuSPB!=_u2a|M6u8CJ2!r6K-Lv9sl_nO!3w znz~I&UT%5vnxeG}!Ezkwx{OslfP2&-m0{#Dj`O2Xj6Jp!t?m_{dafV|pl)o)a`Q$uaI`=KPLb7!hg$2f`0S>= z@b=^lnx|xWmz|jlh&Sm^16-Qf33dAa_E~?5XPy4GZ4lm2hr8z&Z>`Cz$05G~eeTkxs@2`^H`DD+vpAI+Ghk&B zgE=BoR9u-YwYQ~@A{?@9uQT7?@6%rY?QO?Skn62123y6dYrDEZSW*+U$iXB@nUKoO zFtp11(X3@B-=p7vYTciK`{k{EO zS^xJR^FKYzv$6g^QFq1Oi}p8Hir$g#SMWB}{PuOYx7PdRyLG<-t#4DMs`Kry4K%)m z;M0uYIV8(-b;a-KIha~I;QHoYuad^&PR?*#+*T(+l{Va;!kneAadLH!O(=b>T3E$8 z;C^K25HGN4kCuI&7;vGYLvf_sF_+@5`CbO~+}iuXpV~igZm0vYU9n<~ zQox^3^ae*!jIJS(;ydu8Cey6EDp$}#wiN$e0xYJ!0#s?!k?6cd8SZVp_8|J)+56i8 zVmkkqn9-H8W!hD+3$F4pA_-!Mh9n9Kr(t=2y&*aVmD@I4tdZRHQfV0Hbt70FmbrIC z<{J*iyxBO+R}I1Z7SykAzn1VDG*_j0NuYX$Ur5Wj^TJ51b@cLcY!#NF1s|1FlW0YQ z)YsT{rN3q0gFk}UD+r5fN)$?`g)(<*To$&de|U#Qb%WUFrl>d%0!AR3;49Phg0DI_ z?UFQS;yPwVmRX7uMgzwIU3{>w1HMLM5kRFQahf(`jks#Y=7CDY(8Ks!ZscIm`$l#w zmC?wn^PS|5yCPQ8ip7xvsRkpk?V2Yi$W27(A2B31&SxI!-|0}Iv0w$)CR0aY56e7X`e`8NO zXGjE}bj_ z1rj*_>;qfD41h5VuTT<=oR{m7kk=Ssd%IFUh33V4^OE2&`|L^{wbpK!fV0Zs9|L=o5 z!vFh|XZJ`4zyt5?STulMjOzRCpPJM;58+`6H+*Qt9qKHnh$61dl*f^PXt`5aAV9~ExT2;~bRu@>`*FLabretY! zj$#zDl#HrN2ZOL%43t8vy$YnpZU+?5y<<_4 zIcCK#cd$fB`L};DVwdByr*d5sOMxSes1U>xXmNpbWM|{bhhj~Dv!CKLysG`s32{W+ zuL9z8aWO`*SW?9cQ+3lcDA<7)vQoivmnO9V5I~Q$OpeXA{97>lA83Z zk+F^Wia03%t%2eZVEuswyGr_X=-Gs*;Ankpil_~5b8K(GI<~NH#57igD!WuZx{Ols z3?T#U z*|1-0HZ)XRI`+bLvien*Q?e}#uZs5KFCX>SqyBo-UyY^DqyBo-U*EI-dPw#4`KzRW zs`LM5i||fjfB)1V|4aX%eEw&++j~6!`ykK8@xQ0~R6mpV{v5{;&+jK1I9r6pZ6F@c zt$po9yGQ`B+G$(kvMs{`weDJX&N|cgX|@PAc46O*gI7V}ifzks7C9w@c2Ek0)c97t z!1~L|Cd+gvdShbdQsV3hms<4~E1(rVWiQ*6&l&kW$+|h4PAM^M6T~1+fX``L?{u}g zsOl@S1~U}TJ9O67XFl6%t78PN5XxE}RsL}PH-Z^@mxL$~Ng1t;dnYFc5SJYxDQDau+lR0!W8)hGg`1QlomD^`OS6S>2o8bZ65JsKhv4q+ zF2Nx<1lhQ|y9IZ53Blb01b265BYQ6A{%`X*-96LYRkglVMbQ6X*r8UjT|_>AFLB}v z{c@OL?s6K(dn+-!PNu)8q7FHCpz58*MlO1oBhI4zb8acO;{6I`M`sGKOg?3=1? z1RT8fgKn$dgUD5))brk;py3xXvc2VhKq<>(Ctg^dufYJxKj+2csDs69w}S2J^Y*#@ z@J)XS%Y-7E`Q=g#hqM#Rg%nby@i0r9<{dL>OEEnB|6n9f`K#L}yVt*`ATRV2=o{b) zsN4gVeY=2Tk=&U3-l+^HB?Nz{9_OWLL2S<~lHQxyKQZnvx_Q;G;YLp5(;|JPv(8@CjN6w71FuT3g257ea>NI$?_R$gQy_K$CZZOKfYT=W>XjU(%#P4iR#wxg= zq)r4*AN=@}Dt4_XshS#UeTF{8h2+=X#`BHa@>+{*a4CqKMzDY*`?F#*ff+$HuMNwW z*=$vZS2yHedB&(om{>uuWT`x)9yf5en#y4c9c;1lr!Dfp=FlX4jIZSjC>ti+S0zvL{hHGzDn`Ze-&lNTRkrEkGPKt$VOn7 z`T!q7_;=O=Jt`|P(#c)W3vo@&OCw7?^npZy zhNn+ngRa~4an%=B6E?-msylzbv?JlF-@VcBz{!7UPxBstdlHxG9c}7Gyhtj zofl;Wtv`LHt;0whHFV4hDt3;h_q5M|?xP|*`bU7YH&l|9ldsm*)cCyWVZ&QZP<-i! zlQ6C?+z}E?j~PC)pBZ=9Y{VL?R4t(P{D!1YoY&%$FfI{McuQ(NuA|h2navf6y!c_8 z!M7z?=A15~)tV|%q;85(>X(bzQCcWxJkopDzfzyNl zS@KI+s|#$+GH`l{F$U=k+BSP#>K7ma18X@i-Vtyv;EUDp55KYufqjI}YYT>^@CU68 zrP>~}_}!B!#ulx)=y>I`mmaR*w58yNRYy-jW3kJbrTJ1^FxjpXceco%jx^0_hhnJ3 zQJ~LI0&@ADko%b~rC$ePDsGxwnWIH9mR3D&2-Cm=tvbx#3`HfH++>TmA@hF!0ftym zT4FN?%Sj#Xi|-pfRe5(nDeWh-yH{gk-3SCSoHn}I2Da)3ib{PN%T{$ltxR{oC+VyS^| zMBNcsNHyEv7!i)!-`A{gEuOSbO91)B5nPoBDCVB&(fPaGfIJ@anE;HRap3noCgCG* z?7Z!jt)S%CD-0978JwzhwFKR9Rp!Ws&xsa1haQ=gmiXbn8gtI|Svo5d3up#=y|n#V z0#ja1QDjsG?p8#oo zr2x~_g?LS=?eMqh%6NQAgd9y@dIYM`SWCJtcB%sTme#d&x~G!ccnh|v^d`6DV0=fg4%eik0}EnIGC5Nu+ej1Uv4H)M>8@+M_VgQ-9&FV zlX<)i*#i9|kA#YMmn%kAHlEJ-=_jcNuU{#Zg_)eQIo08snGl++xpU7F_9lB)-k7}7 z)HJ3rqh`K$1TNxoOR3$($eT;>wNVx#H@ETfw%Na7+{y%agvCMf5WNQM{J``MU{1d<5xxgOT z3HsqA7`k|^e>MA=rnQ4R+2-r$F_s>Z=mU(+UtFY!wV<{3J7g2E50BAn4h0E1e^sWP zF0?Gw;KK~sb8*9cH~qHa&=s%^wH#Y1HXiYXng+t2g0Ln#=sYfaxy!Uuj2UQF%5cuf7 z#r{u!<|sBr!pB-Ft+*@blz*2$`24C7MB7Bk9iH<=AGEW&lCoX{o89K!fJ@4CeSGj~ zKGfgl8*OSMJ*9Q1bQj#`y|sdN3ENo?6RLOb1940TSj8{6EU6j8zY4#wj*Z?Dhy*wA z7)+_uJ6^Pf7^(|`+$k$hp~X0qK1SMXMb;i#nbjqWgwl91LA{XYRl*4VbHDyD@a5m! z#}oT8C^!`SU8LmIwdVi_L^pgem236bff$i=%c~IiQ8M=rZfxrVSj!sBz#c6FZ3zLxL`|suP@)V`FSjj$hm!roM^v5c{U5bk zw#-U=`O9W(X-?SP6IX)sP*n%*=AH6r9PbSK`H1-+x7+bqUd57mX8bk{&jao0?yv+7 zQwxXZw(@HMMbrwzlThA!=6A*OpTobQZvRL6yhQ(FOt@bjGF<|4Y7fZ6;VkrGE>d4L zD)vUPe6wh}WStJ=J@$Qoo3s7dsBsTRBj9m=xznTg8vR+M(%EyrG38^o6<6?=XYieG zb3`kdqG2|%!TZDtfsgOU$MIN&vWa^ISeqNAozyw@^;foqy`0={w)dC!uV;^Em1t{~ zSQHuJjfuT~aQ$F`lrGO0yehecS9E;US+g(NpAUH%oa^T?3Ggl|JKLu`dL;gc697ex zB0pz7#n}ggjXGQ}=!I!ECd>!zlCEL^D?DCVJum9IR$?=vbLOELr8hEdQnIbfGS+~o zgBuT~hw03smOWO}ClL}qr@9XCm6&UXU+KD~O0HYol8|M1s1rc1!RjEr(e>=9%pJq| z)How{aL&#VCv$kA;$6nn+CCUp%2>}xljQj5y>QGujlmhC+~7HxvA_paXw;s{U?h7q zmuNf5iij3vxxSO@kW8M86EMAoJJqnIesMX28sgc2gXT^hE+gyjXoyf5P63e|-AU=- zsop_A|6t0BLjPCO3r=H21-xc#q5YL+k*ABjwS_)gc$i}ymB?fx1IA`cfZ$@m9Ki?v zz3#=$=8{>rx!7!)rn5eiX%X&HvW^#^#WW|O;)N56C1B)4F+?<`1(kRVY!-Q$_N(2l zLafk_@X!{}4hjFt@JafuDM&6}yyC+_~nhj=(FRcjPTFN+y~D&e06 z_pab=sO%~ly{vW&z?3o575;gZ0>>a2n_J2MX+W~F&85K9r44L(w)%-lcsgLh*sQyv zkb;5lQ7zr%r!GUWrinu0XMv6YU_G}PvdI+VKm^k?1gsLFGamLnzis~l9zT;F1NH_J zm?Lx29WGz`tsDLTtJa)uP?px}-uM$wmKF`#pR2|$Bh^_deWVx8Ru|rm7u-X*%RMJ` zD>^h&nSXw>%c8ijjoVTej{RKBXH|dWtOmkEv!oj{6PGV>e;F*9`A%=)XwfCeYVu}x z(YBY;lu`*e_=j0oNPb}UaX$##ee#HGbJtTaV&Y-AU15}`dqHblW^FJZWvVRSnshS_ zc@vM|3tW=<>Qz+pEWuVOKX(Y0#iH7lxADDQJiV-Kp)M=%J$A_BtylZL+w|CQq;X|In=Wc6J=ETKMN}FwQZy|;+bq#-e1@D1x2GA28e^^ zR*4t#ByvuoO4wt@#QZFBp>(Ilw|$VJjZflQ+JL#QDx4eSHCt zW$Mo3CQ~6xM_W{j=}NO0F8-+p_Z3Hh)9^3xAbv%5`QkLc{%0EN;HhfyxQ9!AI|N-` z_xnu`q}*a1!qWMDFGAeL49gST*x`B2Y=0ThOmyRsqhVc;tukm-IP8oJBGTmR zEBDqO$z##jmoX?<6_=5!)(Rs$X)_Xkw|T7Vim!K3aMTc`jfz`bO!n^BF;Lv=qeU)M zPsih!hI8_aN;sLNqSmZ9MgPZ6{Tst|_!(|50M)B%VpV_v=10mR_i@HsL}RtjYNnzC z_Q|wE&sm51a6S$dD^p8!NJ%>&SW;@BkA_~yjCfJtfiM1322Kp?2dECcqFn($2#r({y{(Qd-n zCB?UFh5PUa@l3tY5{gf=k##y)^;Qf{wl6ph8PR-fM0eD)6?frBDf2KCIBKDZnC((m z;`niN4turFG6`a78i=l~ds#wIa?>Gq`$KzOK5+Gg{jvt{I;xBNuqCE@D3{dl@Uc_d z$Yw{w1d1~eJd`5Jsj3sIeoix~C=57+Jx>cIC*n~L#ZUbq9$pY%V1+mWH`f&-S3zi8o(}D| z0@G^uZWc9b)du3>dpQRJE-2(WGXF3#$ZIWbjkQJpMDF_cwPEiltnrTTIJD7=khd)I zG2a)#)8*azgAh(a!qDy+RMRa%ilLMR8g5RcH?gOp3Y68vhZwR zYQ$C)4a~>?SS34>&r_MD=g(q2Vmi}<@Nq?DpU>s#n7uSy-_YeLT#yX?0U<1GD^3W< zPFz~{X@(uer*6{Ajzl^KF;bB10nzsJ;_UW*r&e{Q|4@TM{m-3dTZb*E->9=A{L5?5 zSb5fh?m`uK@cyz98jSxC7d11nqnHwYRJxWS|GpfbeyA2iTLc|HrRw}%tODFI+$+JG zh=}iEhcM3~Kq z6d`xcr!8OSDoP*3*8jBj)-QHgj^+I}v%rW#aWv>^Y3)|bDGj`Nt}#50vN;`(NTI=& z*kI722Uc}<#++L5S{sxHZ*^^^927w4Ft%?CuqlxYGs;()F5!lp1P95*x6Yw7e^)HqKk^zo?$BLWdct0{2t$n8S9x{4D z-(P~B(Za_g|NCu_6Vs-g`T6&sGXb<(%|}yenVc`J*^9Z0sA$1SdTzhHe&Vw5H=creh{+VKNfdhVJ<3q38C6rO*1-j!}dw zJfFl)&a(GZ1ha>1^^$Un?`1I2^x^ne6@wTEI5(iP_*Z^StP}6*fTSY~G*B*Q2`8+7 zwniv5b(HzU)N3DXl4H!wct3rr#>PjFR{6#ICk&IQWu=T_)-L`IIONknkJH}$ST4CG zPHW^j6=(kHzF$;lkeH@W?m{j1j6_^+`sJQ=8E|+mo@+(kGlfil{pH& zA~caLO`|pNdDX|KXi$wd42HExZn~fEkRuEjkU-5jh|V znvDHm$2Hx+t=d7Zv280Nr?d)0^8fH7YBwUHEr88_sU>vUn0YSjXzWbPBvZQ7U<7cTLdw$2OBG#eN~_{n z5dI&RK9J+^T>Y_ZSJ#iLj5qR!;Wgf;0(Jy_ayf)%56Y!x;cKB;TY=$})l}b@^gliB z14;&qX_lkE%Q4JUa1>Y5ut%u{fT7Nt`l2WVf@&#k|gy9tvC* z)vG$^gevr@xQI~wcyeq(C|>p&sA+UC+2M8z zgiaEEVea=gE(X6FkJR#3x*V{&iM10(GmYe~#~q#;)TD=45qo?l9b=~yV+~(j!Q-7S zwEI`^jxFgVaE6S+jjo2HlR%S&=XW}Zf^v#|wVGvKDK|V!)&VlDAxBA8Q)R}UWOL?ai zqMyq~OeB6N_w0@Oi&s&Y|1byfT<7Yp@!N_K%*<4k$CS3u2jS2p`X?jUYaz%ki@z#@ zjv_EG9HT017R=5zb6LnC(zA-DNaLvHE{iGgp|Z1c{wu(p005Y@k=#qrr>~%X5s7!z zKIz+g)x~qKcPc^#8V-&|g%44eJ)D`Ynv8A!;PV1r?|}|gI+8@X%DEu+p}#{u5v1Va zmhMkZiN5lUM1@lu(~1z&*y8{^axhzZmQ|{Ir-r_uAWW3sDY8o+Mbb?3L3rQ0ml}0s zSIZ)@QAKAH&y~f>-H6$2y;U|=({F2*xUrIBjobj^Sqx!vCnTR%0eG%_;pzL**(V&; z3YgtHIhL5Ur3R^$UUL)WfpL22>Ap|Ook0@y=(Uc@Y!#GHt6Las8=FzeNKDElZ#2J& zE%pMm9n`BjxcX-UcAJ(kwc(|hZF2Uy;6H%Hv3Yej4qVvIz%skcd*{^%OmsnsGn3f* zoArg9Mha5B2UMC(Y$_VP!@nFJ!v>GS20?FiR+XBPot@pj^{0lpW+$7EI9Oha3ZKsv zmojx($%D+Kv1WFSjx7{-sES>`G6Af`*8(v!F1TTkEp3z_R=E$m4OPJ%n3gc}KQmge z9Y`i7``#!C!>FZqaNoXZ#$qd)VPLGGrFiPun<#6aC}gP$a2loRd93j;TK?VmA=aZ58AK5o_wVtSQYw zNO}m3S#Uj@B0`<_`a~JJ*3wfrvWe;|NN@1>QchpT)4p!%Su>C3R47C07V`cn$i7PT zK6(N`zrf@xC=vEz3OF?Xeh&uJq4NMGKiz#m?X_bCu*7?R@_u|c^mvy5j<#@J1Lc}V z#0JD~uC9tU;)GF!FPD-Xau+vw0Pybrk9aS}2I|XqO z@}D{^E9NxT^dW85HS;;H=d>PqEcx1h=++^#@p1QH)r2(byL&uyXamQ#z7A(l`iH>k zxyCCf=uPTBjbqF!XmC)`;{c{=4Y&E4q1GSMzXEYK@Y0FmlabaFR+MO^LBzgu2=_I= z^KW`7y{*YGLZn`zk&?7@Y`9<4R=tRZ?`EfjzBl_QR?`DJVrb`StbjFm?l%aTTldQM zWwvL@k`fFOL);<+_ihUPV;luUKu`Fe}3A7kK8y+5POFHlE$#p2^XxdvLk z6U+vselj=&)Q~trN+A01i}O!}O9p5ixK{f^+)$_eFGH~+VqYB-Iv}+Vs5R%M4)+Kb zeK0NEkfsgv_f+K+vTO5t-A|H}>eZ2#Ma4N;?F@u#d$S7^4?EfW=ikG%Gil9=Z7DEs z4gw(x8DSGA`D)w(O?`!@fpO`-k0?6&e)<9BJZ78QKw_;VrlYyP1G-y9%#AS= zjnJFp1VT+(`SBRLBwIIpwhHuu+K?k~6doVTK-CTv1{@CS)HDs!p%JHLm{D+-bL zeCZXZdD7cBu1^u&+=ee9-Q0_GYmz*M234ks!0Rh4a!Z%P6Eu{VP7LlKv})Kbk#x}g zErv|wKu+Lu!MEu{@Vyq>&$uR{>wjX{CCW*6IQj!C(}ks_DRO*!`$s!&1laxkr$uRS zp6%_L!dIWR7cz5US_cYami7BNx=!ub@$-DR;IS8FQ~ucsWuX4S?cIzlTB2LuE0+M} z6WFKscPbbOy4YP}{1&#$QsRsYx^Wvj!ppBna&G#$FumwwUbN|_kE5o(&j|i=jHJy$ z$f;kc{}m(qD-D&pi_-*zL~YI10UMjphn+ktc!2KRhBF_7BV@CY^Ho(RPxbQa=9O+a zj&HtK@rk=jiAuui4lfDyyfc*KVASg>GKucTjcPIF;%1?7mZ4mGmuB2{>zW5py%0CN ztV&Aj!x$IDuZbS5fp}bO@~;Ppa=CtvR`&*#YiZ1C0ob}Gyq}7ody_?(kTS9Xi)PsC zmzs)6EB-EW$I5Dk`G)g7V?U* zx-n|MU@{Ve#m$>v5O@3bp-mQ1`e#)J)=yiQK6Gu`>wUt$-fpq*Smv+V^n2_8EBdRT zbT3SGzVuWsyM24qKP9ouuexZ7^{$>&wEd^|*j`O4kA*dIA%!sux7S_qc?Es5G~})o zAUp$+#&~P30#TnHdlhIUA+7xPmXKd>?`nSj7o*K<*BIeMc39~FTi8+Z6U|0_(N_@c zmAd{Z+ZL#YCK&y0b#IAMR?;u$6_P`7d+RfAr z_jFxbn0#lh&Xl54DAh`#a&Ju-sBoY?)u%pmS!jj@QKPBal$o;Hr(CCt^P|ph>vZY! zUrM}j&Wr+-ecs71xzI3%zi_9lI+6~<{i6)8IK*WlVWd?&ky{90QoLkUhzswWi6jb5 z5PoEc@xVHG(kx(o6F`QGojZt z9`se9-gIMR)XcOJmJlXhDE;9ULc1}l*vQj|@F&$D19{Jl!>{jK0^bM#+ADz`p^Fy# zt`@~P*EF!tpvv6jY@`5<(_AIGBA@)@LdF!ckcxueDX$^XsiSkq!K8fxh70i-{^=PaqfgHq-yuOB2*CDx0cGdJ7M= z2LrW3SXEM)PuYcEKloMERx)r#;hfb1YBA&q&SJ>dG4mxD%LT4S{mBhY9b#_SR(4fE z&iXQFPlH9AaUa=+{Z%!@Te&5s47J@x#2dF% z)dns_ax2hiv{ABLN3V$PsRysX6xLf0XK#Lr)AcrXxq$tRXKV#?5T2(HmW$S2Y67Q| z+lHv+@pIdo->W_*WMmw8{KotQ3Y{Y&&Q~e}vLK-8>!Axu02Dqv1nd`iU_smDa7YI* zUXS{TeP2)~&}!iKa|i;q}8iHnL*b_X`daFn@sxUz-bJ$}UW!XUL6$UC*32Bri3 z?REumw;rxRwW`2yjy&0$5XQ~fHsCzx9S%*GHtuIl-fPEI0G*1=5xB3800{L6m_U zf=;AUm*4Y9gBIFhKYcc_caQ`$OlWG6Fmd{Epe4wOOpC#Q%T?N0UJyVC#rdOl3xPy4 z(%l`K#b#oR!~vVCD}+Vx$sckdDuxN6W4HiY?*Pd~UAgD)m8genpxz5;<c-`KM!b`)P1=qq9IzcQ3w#FBxwd+ zk7OwCr{1q_3J@We;aw@n`(8y0Aq%6Mgu?mK>R=Nd zB7aGg{3`EM0vafn)3?WsD!6V?G&GMcF5)pnE0Qt!t}{!e>Zs0_QnP{A95$wq8>@bi zN;d$~-h6H>%bBYK98Cy!J>4FWwtS!SzCOsmIX-9uZzj3uFMw1%DU^OZbBYWjeFQ~r z7mSuSmtRk&d6I3LjWpn;fVAE?YzuvILaGFCxCjXb;#ALsIXV#s_OZPk3iSiG`@?o< z-J^G|zn912ENhJnx_&w#8{+xGelDaC+CQ%Ch52?YZU|3t@ya6r^FgV_yp1|&0A~x; zoP+wBVI=_P%MF1VGBh>R1}3rQFgt8|sb&e)8Ujude*P0eDb+@PdMr8wBQ_1Lie91N z-P9o-ZrLip8kIX8ZK{56lx{M1Y0q7H^g7kW0eSZaT|Fv6YQaNsuKTU`*W%&BzFb`h ztNG#e^s@%1M?B2?qzmO{+zXK`c}=_{abdThwqkQwdURu)^EPrGq0U$E!tH5ZZ@cIH z*7yIYwdWH>z)#${Sdrm|LU!n{ATa>Cx z+!ITBnam%08;pCYOYjfR7){tkLov$5eT02%O?OYHq)<25&<4^-I*3dpjxyo|!7-6O zBlhd8)nT=It*8FeN48#A9Hv$0rhfKPk&Z0IOTHiE_GK&x=qU3?ciPh;VoHr*y=DqL zqB`UMa#JGD;}#MhfA&P)*yS-FLW|9)R)16&U596HY8N@?U8Z7_FurQ74LJ4Oh3=J> zuTW@KM!z4IRj=(u;8>>^4^9>^=A9`@_yKManv`+0d3rtW z@L?IKvCRcKFP>BY@Axp6%tktjR&q)rIL{CYHtj!;R#118_=#-%9J`2%uWK+}o-WYr zElgL~i1B*m=Ntob<Ug3LPw@*OOF?FyuJRvtMU13@_kA29-+t2%J>!4HoaTwQssWz4@N7GYbugzc z`zbLmM!IDlvu{0C^}z6aBru&NnEM`^&X)oEGRBXkFXizwzCVoyc^jk-I}@)6Ih)ep zLN|XS4MEG=XKn)QXr*3&V-l4p5sn&uxAZ92u?KRUCE%Uw1q2;FCmruXK;cqn0F}wO zUJ6jH*jd${Jl0JTnDW%VpIiHz2&ew{`+B2pkfY2|1w!j4(TUTy1<-&0DZ9Khn4{Vd zaMPt!LR<3DTLU6`J6Di}*WyuWuIF1?rug)kM>dSEgwBF5X%RL8eYpAC48L+mia-}T zPF|);`Q^VQ-vWF^sdgOIyYW;Hn-nDpw0OztnJbN@GV8FF>H9DKVa*?lzZ0~fUlDJ` zT-I~T2Z^z=Y&M<9L7ZB1amHmI%mol?zMdW-)oil4U2NH9;f%NKO{55=X(n>b5Ei4! zI=S@)h^(hB9eJWo1Nym=V35#u-pj6#Z!0!%j}L&^Ff7?Nf4PQu>Vw2#@FR%$Z^tT} z=xVO_7$tg=Dnx%F{P-o?Y-01}mU=|>AujlpOXv+1OLj`8!PagN&PgGu)I6y9y{pE4 zKCue0A9^pyr0dv1uupl@k0uM>%UL!zn<9M7HLRymCRkb$d_41s5~yQ(KZy|UYFYq1 z`&ZDxTknP4nc%^HYiR}aQqQ^vO;Lt(FP*q=dEddWsrOlWlfb&gklvUdDIJhmtpM`e zld&LlX?Znl3A%4lW};wJOZfoDaomS?Q3?8A1hhX{i?5Tu?722UjE}E z!fAyS90FleqM-`SQC$?vtThnzylBuO2zodHK2iexx9_MZ=~4MQFes3vXSAqs*>&nw za98ri0_CxGq9S5>%d(X3vATt&&vD@>5&)m#s}&T$;AYerMcH=L6mfag^bcq_aaG#h zqyfe!fJdKA@2dZ}yB6T|Q0IsLNoT5na0*jvxG(b=!SLtjA8gsM9Rn2hYwuj7YK&?h+>D>xV~uw5 zUz(+$jpP1khb&6!Fx!gPwS5}@&@Fq%bZA3y8H^gNsgXQ@;&NDXyI(dR z8LxqhUGQ{}0O!l*8ra~m%X)9ybD`^N78t6u)O8Gd+?G7=ASD2QYTL-ujUHN22|TUV zi|X*F@AVNb7W?G2;ED_ueZ2qhS8w6WP{bNk zXXA=-W*F|tsoekq%vomeq%y~kb%|0>9|(^UH)L}fVeJz53ho88f!%=IpAg3t{}ion zZGNnJSLm;hT)RI%!#!G2INLZ|Ouj8DK9~^nQ3`>4PI6;kd($wC$$;8Lz{9d}_;wS~ zi|JM9@HOpBst@E{=QEERpWl?m_?znd)*Z3TkgFYb;)FL_7N zbO0w7Kv-1)KqeHwsMB7!LWfmi}YO%XtOHsHNm|2Xo_%+G>B7P-YYM$g^V_~a%o zWkv)xS-C|FkFC6 z$liZHN@*9s=-&HW-e1!i{Jfuk!97%q+OjX{NVK4Zu)!|fI)!scCnQ&0v;a{$CQ$_G zWdrID@0T;OeIQ7n_>J{Y=lrdSx3{+GQf&pyRO(Z3D>zKrU$^OgM@1UvOA~09?wrXkUWpGyM1I2+dZoBWzF*b~>j2mZ$zIkD>w~3z}v+1>Trsw0z;n$;t z0%3hTrhV@-Lb4PMxa1t0y}mCkA+U6yBMmi}->KnVG5e}p@6Z`scXiQI^%C%A>gLm_ z;BcI#^HXg>bs?MM{mgq#&P(%jPu=iItvK4fe*(?dF-_tiK&7U7s}rwBI3s z`Ku>z+b{6?z4Y>PEOexGha6JuVE44{XdDu&YWjuvaU52g@y_Q+|2Ey2C5oL#6bXJm zZVl{SD#~*vNvZfkw1L+aMyE|T+d4Lx!koYtMB}=Lw`o3SA!6fc2pK=* z-x|=kZ1(yXB;W%W75EQ)Ufm)5Xxu5c{>=O-WEAg-#jY`7Fqh8W!YP9)EL2cAd5Ene zoL)AKjqY-Lg)syczd)s#WYuGfGCU&_Pi-riyS2)hI35!%!*IY;3m;u(;%^VmTf-oI z?W3kqB~s|;h(;`1X2PZNJkF*Ycipd}M93kI+ERO~<68FNX8j~P(eq!}WV&TcRUXX$ zh5pH+a*)zZOhgOeIr-vQVO?6F7PF#)N10juq2ODYngYK{DdBm+MHX|cIzhE(gcecy znbH1-t{9bf?2wIkalycNL^+;fg|O?Xi~3Bo<1#4>S%9@zEqwXAY+F4{(0jCo5Gjj0 z;9TmvUKOz-wBRVgnU6`0wQP_19zx&SSpDs-o}pgZ#~med5^ehI6uOenB-o8I6fGK= zx*86<64i9)M!AArL~Vwolrs7jc`j5Ew~d*8C-5fc&Qqu2ZME{ZIC|eCOCp)Y*jSHG z;e7GK**p_>T_^YCM=vJPaTaj;ImRysH0nA0S-r#_CF$TG1GEJYRLcEz`|xlD@b%>= zml(?X4m6!HA^!$C5j+5Wd%uvhWfk*Z>M}Ixn9(huETFk`Hcu+iJ%HAH?$uuwW8hI% zgT7n}TWvP@wAvs>bMB{i&e-<$4F1T^wx`#jr- z>HJ{{{eX4?c@b$Ckc6hT{(6HG!qdrbh+aZHh9>_770*M80lHa2ZU?s=uL&kT;z5P_ z>7$S)cv|N)=m}W6o=67N4pksR6aCYm_O`2SzH?f>@nLy@eyvk#r@PlbjIRgm z4&%&)%sYPFuXl$8MnqcS2bRBF(dhl@VMHRyCAQyBZCm1{?9cCNtW@7${o7YiG*8UC zI#h!2Y%&eIM2}nFV*BRDDuM*6F2WlEODNrZ!vGcUl-01Z7b`^Ei*x_~H?r{{0pC4P57&hOG#%N<#VpiK9GQl{ z6s~a`a(p4xALxlQ=0WdoubCzBg$s)MbTmUwSA-F`hTefWtusOLPcaE!=C*K!(HR}3 zakf40X+8|vo^!1E{mJD%JUq2av*A}KZat(!w@pp?NgGTB`$y_{+}Xp%yjjqXZ(A}x zfEe~pPE9E<5huEV8N+RJ=n7#6iKUQ&JU@7=NfI-D>0%3{$*5uGTTSgrZg(oyr1_nqu_OHRgkT_IA=5h=8r0*;Zy9Tz;#o3JN> z$QfF7%KMlN(YQ5dS1ppJQTK{%K{uD=-^r$amsUv)=^%@ozVG=MRfD5qEn4dtDvgjO zU8zbH9I}NL{xW;0zaeos2e#uQAw5{&xtH2*cw_AhbA|A7!SP_r44BD|To0{F5-2t# zT+x=1jdD({LV|I`N4l5fzDjZAz*^|@*SKNA*}(T%)8{rm7Ymy+8y!^m6+XkP;wF0 z%7(PQrk&h+5~LxcB(EKnDJ>)nC>^pA(`px^3w8=;sU9V>qTU&8P%ATEVQFqNF9DbPbbkb`4D1#CKx-3{Bl zE&M5S=B2E3`tNVpAhIWYlppU|-IPfUi$FY3zAv%Bt%uh)GVu2XG>}{b05*hpO+1zU>nP_^6lnEXxQu!V8DDx8U}enny>)? zAGj9AIQ+o}^u~K&aXAAe(f+bOU6P>U$qE)*M9J&v4E{i zbaU8h_Gp@LDt`CfjPsPi>D6%5Z0ZhOoM2jr7Q)tee?JYq%Eh3e%$GA-hMRJxU0Y`M z$cOysl`F4V=`0Kv0qcdlQc1G#t|ymd)gMT?fvgL2n6X({kRMZ;)e}ZcvJh)CW$f|d z=KxSU0c8I>6aokKyVsayKQfa2lZ+dnLB8El-RFCyP)`dR3$Kk5a zBoU&?=o|vg{ofg#e+%yo%JiI(I9`_}aR|DDSs5ktZ)CAN=3pL{K|QuZpsDYWU$5`i zK2sp2SlPeL4nN7yqo%4V2{R=9LPJ=cmwSYKh+|7F}wn*Bp}tR)I45T zzat-vM1QTo%0pmOp)PHck#hUy+-n!Do_gNjH>dHj^a$^YLx}xg@9MGe1|Qf~&UEft zMttw)RqF{TTofDCRzx63uGOU`X!STw4ppYh)3C_<{}ii5!DA)!)w*gq*fO<}D;^Au zlYedWIr}dk?Trof0tPihF7FZmp^;meX^=Sc5KT&+@2uwh;ik>I_pbfXz0a)fU#|y6 zvxP1%vi%(HrlYfvuXVrQdoql8&n=>rxt)Kce==p@6t4~mumhJ3f>Psh0Fq^3P9CsI|eDX6$l=3vowONM!o}}F9TU?NuQu;H*6>rVU8*H_SmhQ6^@T| ziM~=33MEvr)4Vz~zR{*>E4&)1gP->fff~yV;8>A1?z$J__U{$QsqddJ5|j>M_vrgK z?6#F0*p=xm&e)||WyILHS1Y&H&=%Lk*r{&+m737A{sUr_`PwvIr_H?Sau_w29fQRUx9efElpQ0l~DIuJDTDVkiEDw z@^v*Nf_|#8e%{lo%=gzID1h1!QK!Rvp_Vk*yDI(oDUau*ZS6%Qpsuorj$8manqMFh zh+Cvv+0u|#bp?1Hu0WPMSrpY(}WH8Wq$}dc+|-h5>L0 zm)pn|zk+D}wU9?!BHBa+^?uR8RE9H&BMZc8Ns&un6+IyYz|A#3@JIIt(UMCt=BlCR z($MSfV9?<>6aak00c1N?h|&{!?1{pGs+imFoq!~#Yy5f&sU#4Uez%v=-aNb_2lGs# zOESvGfkE(K#9xD;IWvgSeg99l3CJ(Vgu~7*%nS^|W$Op+9V81xqnL)(y{*bwm>!`g z8*%QlO{&4lpxSpTl6H$({>$?Bt)1oDGvnleeAioqdFJ}xa;lY3G(4|TyuI}G^=*pN z%rC*#bA;X|@H-C&^#bSkkhiVTB-*XgxhT*#1GP-^(&1r7`K49(kBjeY21U*1@55aO zio#qUrsau~(_H_6 z1r$`l;MOPDm-G_;p{dj-So~m~J;)e!teC$b6s(82lzeFB^XLogX>Up#yE* z)o$JO+1=QRA|xOx2ja*tIN{4+R_fRLpIW+ zX)?JSNo(J^J8#{i6ciHpg{&L1sLvd{2Xna3aI^g8^}4?_5gD{Q(Y_5e{PNr3I;Q2i zFG_P4RgnyXjBsbh<(lKcUHE?J_8@$wcGnl{|lebpEU1 z;W{kJp;P~t{qb;S>zIBeo(OIu;Vy^mR|LC_NykcL;zX6vd~B4*N}Z=Yp&lrtS|F~Y zl}$t8JD?GKF;J0r@r zM8R&)c=l~{w|UZZTzbsg5Q7{pdlceM%ZGRmT=`?xjqJETJSx)0BiQnuiXo(!BL(vW zMIr6?Cs&(9iu!-#MLmC#`-0kIk54?##`6}sZN4`(Ca_8$7vy+$>u4w>^fEkHi6`u- z`1{dr$;B6bkh`BK{ky-Nb*LEJNa7m;I}Xw?9#MEIpNAl3jhYZ<;6-KvChJd(kngt0 z(h6pM6KAIYG)nOQ1t>Jv%i|TeO-a0pcJe?dWOj{IYuKWZ>=E-5r6o#H9H5L>eieh4 zq7B3`gL9T7nHVdlo7{68i`)|(vyD|RX31N+##j~X(i?gweb}Wt?;+5pIyDr6Jvb@Bu!C3*`g5a0jx&dMwskP=y$+_vI+&K%foG1# zS(dS_ef>WG=0~L5wIe#~cbt6RKKWDI z{V7p3Peh-+PL3@0y|vGiS}R7p=-p?()aQw2$aq7ymy5?enRjC7?E8j3TZG@FxA2=7 z!f&DpKX2%Ec65k7&pPS9?E8j3TZGu8w-B2cjBQd9VopCHb~5dx^s?_8`fOodlitj0 zVlb~siFx(2bKH|@Ck>Z<-`3&bo=iIKn@Q8YvGB)9Z~i#eU0wo`KAxRVbVQ%W9oNu! zept(hV=i4Wi~x=a#mk+vU&O$66FesqyWknuy5+=+-UC|}JY&r>=V{t_w}JILG9=&5 zkj6H_Gwv;T#)jY-Yl6oe`flew%NG=`gy22#I&M_YVu}i4ZT;^ngvN#t8f!vG@4s5( z!hihk)!U0_7iT}ey|}vg=H>IBpFMwjasK@36bx<%4hPaB6%+8{@(sWlfLVrD%t+%S z;&$9>uANvaom&}8kw~}77;P-Eh2nFM2s~NQRGuI^PfiO$vCTCV=$%>|#Yaw#?5*>0|J_C2?t&0VFWZ z5Wg;ntugTpACPIwAT~81Q`hcp^K3iG>%EiQ%78fa1ETGu>+AnM0$111E?)5=xVZcl zZZKOIrFGD8PdWDEg!=PG@uFw99X+y0Kr*{sONvt)wIg2iCZ(*QI$Ge4+t>LwJ?ZAS znV#4kH;zr2b$Tnaj-kvtC1tj6pJ%gfeV)x4`fO2Vo!-ihu6ISr=cj(r|C_1Pj-o!(N_F@%UylBzx3h0|{FJM8<0K3gP6@7Rs`$eS5`mJ)=C zkD)iO6P!vwG8F+HffU8$hK&P?{m*x?sS}IXV&^8XVUQmbYedNWu3Q; zXHSJ-KJv!Kcuw^3?57Y+Ix0aEyAs3*wDq~CLNFhBzR~Bg*5{sHkIAk$U-ctyPe zz+Uw3vuE_#*ZX`@x4R}C!*?e3@Eu0HZ9IBv3iFZY7~|pU2sTKe4be6Fs~C*?l7^V&Ykg{%}K9*`O0B@ff2;NRgQ z0NXVBYsPoIN>;=1zqxW`?M_`9l6Y~aT!Wd>r4zkN*29R(fiR!Gj-r0zG_Yycrqa2+ zRXW#D>0Diwxpuos$u{8=7@`ElA&P??pee+$wL><2&F!tP zxrV;xPHQ`4pFB2e1;|=OU<{glZF!I>PnP7yvXR}tee|De|qPaZBy*k=WJsjJzn>Yo!s#N-2BdnT`#6#0z6cuOVdXPFL;QIXhwV<}63t&7J zd2J}pwkfKI4^srnH8E}uz5+pnV7yI4%_Yn?t|%fDY*S2kAYle71Pe@6ZieVDPer0B zUae570`OHnp=}Df!w$Z$9@B_jt2bLn>7LJNSRlnOwLt_ zfAdusq9o&mN!YSmtpky#7L(hNb|*6`KOtFX=rW z6~mBlbtRI!*y_o#sdl|JJ43OXn`D$Hr#t)k^epinxrb%YZ3<{F{gX8`R8L*=bXsVh z{W+SYgEoz`x58-%^g`WqhrZSOb01vR(m|VY)>}6-RI`cJLC-w*fYB}7WirANGEEw8 zkW6NiDLiBe0+iCBs`^c0H7H^zx*a-??KvKE%SqV0??KpnWVpS?`cRmrg$S9J+JrIy zBOJd+R`bv1wCeA(D%0!h^jbX@<+bUbbPKfePppA2Cs&w@2z2T8^_1;^ZGv@Smi+1qs z$&+)-QPsTfN!5uty-sZh)j8G0CW#P_dEw5O3~!PMFLA(2=*hgL>4{@8lV&z9;3$ zt0n;E)Cb#)l1*`r7{LXKxR_Ao&qs3lIx?o2l`+|}etReV8acnS=IK+R=zQ7g@#w|% zQfnB8k(^K|Qur8j%o_9US!1>g;NA(q({gms%(4J-_N3e6)dT2q?3%o*L%+^Y)m|3E z(s5_o11+W&eQMfQpPH8SscBiCGM5I9rPh?BWWj8@2=4d@P`p88D-Psu5qytQknJ*x zHkSC^sYMx@_Em%Ds_sKP_=#*IsxbLsXsJ zisPFbez$87LA=Rp|BJFNH^E;e%juYp@7we7ZRz;Ev+*ZoBYaxo#M(G$>{i(;>Ub-H zJDb@uv6$48z9#jgY*J53CUs33J@@*8Z3502)V%Jc>vuFIeQrwH)_F%0-4`Z$PARR3 zxcafIKR=rEjnSQyh45rF)yJ|nMp_)ppCyUtcgIu!-<}FEv53-1Ur}llnV6JBsXZ*! zm{_OdDsdWCiPx>n9{b+(-HONve)hmGF#zIQk&P;I`f$9m4RO7c?_JcwsA(}NNqOxw zHP_-Z!r7-RUxYRbl!An0bd{p)mk6YUP>{eZyCrF8>qEUD?_H$As8KN~3G%i_Zr-e$ zrsB=4nu@I?Mem9fMnQ^6Ns!mn61WnU@h(p+3Q-b~9W$MeN;yk|Vl!ca}WbUUzqii(&o2@Jo15sU+rf-^QQvisdsK+oi2Am0C%)I(edZvgLu3*D*BHvxjE- zwiqYBcZ`#7#5nnSjFa9;6{1#{GawELd)N zbLNxhcid8b)0V2&vHjk$S-ugQ zsfqc&6c_#sp9c|6G6WKsQs5l{7{Y{~P4Kdg%ywsg1nOcHJ{In*+kSIr4KYk^$Abb_ z92C@f=*4V>h|2P`BnBCU6fL(=lp$)Jje3RO?|DrKZ|NGd;pwwso<*ONWC!pE?jVth z{HSscN(l(oI0{8ceTyI2x5ZBRJ!7YMOLOD7^_`Kr853xHCWim>?UmY8LcUcx#k5s1 zYqFdZUGrm<46N`Cip5cq+wmC1wI8GSwkRsUXA~7{IX8yK(T8Vd%=Q1h%_vAxa)Uzz zZehx|7w>$q-jEP1Ar{AJa7#&o(hbfsF8%pPOuAV#?!;=*_?7@Jzi$ASKQa{9xjqb4 ze>Jo0ZeYrIid+`LqM<2*n+V4UgbT1uqYS{6HKg0OL`3<0BchC8d|!)*lD()W!=^>{ zRw4}@a#lN-`Ib{I15KK3(@3UxsB}-aW8$l8Pki+)o>0H9C)6mX<&SiQ(Vo6zFN)`O z^!U4WkH4+xR_~fyM#(LIq^oT9yd6VscJ!aS_E0Qag{|HNwv75({zzBVcs71L88)@3 zw^n2*MSeRnZ2CZdb)Za!*NzOUB=1XxDaYH9VH21=<)vp%iqnP+Tb-ibWr~a{MP7MQ z##S=wC#84cAfs-OSDq9*8TFIWzg&+w8crKB>aQ<3>3e<2$;d1kR2~gmEV{LfPv6mS zN;f*56!(ZU)8W|cI;Xc?=NNXKquF)NTm<-9NU7g1PH&^eF^n2VGivsbQa?RTZjCwt&cWox4G?P>4L5vKWHDRld)U!NNzD~zwTKsmj z*!W0)Hc}?TYez=Cr0HE+$fzvj6q2Ty3>z!EOA3~2t`cWIEi*=P-D(vt`cN}7Z+{y>8%p1bEcG>8!{Q&3JOB$k8UZF;CspV)y6sPWIV+ZZXehHnBVFEp}&y*qxbT z*M3<@$wZrXJAahPM~I?mr!FGf#@h^qdGEOYKHqUD=9g8KzF3l!jfbs= zb;{DLud*~ND=0HVPpWiJ_K8H6*mC{GHPH?E-EkJAIH~uK&n)`RtgpT^E9*NmL*J>H zG;vUIlf-7^j*Z?r#c0-7F`AVXqnV)?S;~|0Ru(dPdB9l1ahZ%s)38b21LK%bo-Xtf zXH=|ko_-?!6x*0_qa-B($}(9;TVB)_>NyDWZnu%oZI_YHEIQ+?ug*9t>x?r)XKd*l zoOcTkn2YFua#dy=HzrGqlXx+h-QqFkA{>KbyVxWtx#1B`{9g!!v6xu4Mf9ukvt3N# z2P|i=Q?%dQ7VI~(sM@o>sy1tAC=MmPp&H=Axg0M7FC5tG?LxcGf(`VG@6KO?4Ng-z zwUbWCGxN!bS5=V#!IwKhJWbs@&^TFuG z2_}ARZH#mqpJlH|{F)Fx7X=S8!(FLLtmKi)#>8|pFl-lL%`8^mtgqEKH7>)M85Unr ztyo{CuTe(RZ9qlQ3%=O--8YO^Y5}svP!&r##7gRQ%jcTg(z&L#8+E3=Z`7Ic`z5r^ zKh>_(F@_}2OVCxP%xc*70ryJ?6G5$CAqWp7#y05KWy@*Zs0R z<5+8U%05z*(IRvSi-_NOx5^`PTj3E&ptaZiCwy*p+A`tg3IW?hW|G5*yBA9FT=JR} zUIPXObPJn^Bm4;oKRQ*||T+^8{STGzlgQ4-UTF z#v%?d!iyB9JFdxGr(1L`Bk1;haD{oA4TuPL2r(t7cq?voXX01>y(C-{fgr;h9KjSM zkW!S!M}V$zmgBgE8CYy_#6@$8cv8m(;+UcsGIRmSC|DqRi%=}|E&-l;E1x-U(id3#Ayd%nlCzv0b1vMigbI;N9Q9cKOB6L+2g; z^qD3-4h}wo*C-(wrX<~gkAMg3eFSe&%B%tK@!;c7dp?%_$Nt43UgYU;ydQj+4i2u_ zVBicu@EwXa;H4ZEksW&QkTR76QB^ z+Tsvpg(xWa|A?fk;|+|rFgpH!c#A96;xC@_g10$#+~HXm;&?SI*23{2SmHFJqk|#1 zLWpC2|7RehFb-iF3akRt2wcR1?dLarF$j3W z?J@oGFBKXs7A(Lq=Lq8LK`}+nGWninJ>Wk4#jcP`tN|y6l033FgE1ZrP z1vN4s!9Nh=?$^77ad$O(>|er*uJigTlOL93z`;jw{XgI%$Y{zq{zvd`@aFn_@D6+g zSBQfAYEy8HH|RekMhvoMx)yhzf{)Tw%Ygj)8;8JeN!v|J8Ta#^+U$vHTU(tKC8wtr&)RG8b3>M<>WTdEOMyEz6Pau#H2MiUq_8Dv*u>5(<8un)r2h zX^9G@dgOFKF2Dc;4A@XY6GU;BN)Vtd14|qswvuTJ0>34xaAV?lNse-{OTkZUb%rF6 z!j{Q45@aLIROeEQY||lU+){K&t58xtlmmABL?igHepE*M>cEd6!WmycKMjUMxTWjC z(I6%<8vIMGNNpe)Hoix2i~vkme0ydiwrDdPqT(*j;c%OwbQnSkhapb+U=``M6huVS zGZR};fG-WQ0wlbSnWYQD`51zaU_l6*%y&x|Wr$J!T>2%qaa^6kVrk=8UM(0}QQXw+ zGhQ5E2T**2QxbD7bpun(aAxub!U7%Nb5`&##RTN@zz3eG9R)yn`7sIws9PLGY@G>n zof7GG%%@5E_q1**WlOPCG5Atf*IEkiF25crQa3FsmRsL}6{fcR{X-%+iI4+K#6T%#B)2wiIv2gR+mM|_-9Nf0AM6h})^6d-0xAPeg%lXfM}bgQI2 z|9~^TUF4~+oOt$&IRe+pQUd5h!jJhdx3CsSY{Z!6JPUz$IQ%)y;JXIqI>PZPMOoHj zFTxnek2PPp$yaS?Wcqpy8m7qWSn^VV-I3gq^gWJO&v05ES76ELPge=SQRiyL}R7l$o;$_+n6SBt#&CloHR}#q7%MnU+KMx z5zW?wR5oP~p_hXyBpyx4mMv`lv%JVRFYSWqns47r61J3vHFS64={be_7`g_%A3M)6 znY>(wd{3M_$JLRK=j~c@@gyZ13UPD~OC<-TEtOn9ipWZ+*4Y~KTMf8&ACdRC`!Z38 zD%wk~uH>ZDD=W3Yx~w@3e)F2sp!ZvIIVN+>>5%Vf&E>c{uDQHj$2B+Ni^8Ovt+fQw zbtV?biYIt7G=kY#0KLaGB9Vc5^ZF$N^pby3G`&gU)=SbKMy<{ z-X!s%(e05S@LL?A@`@bD9WXd$()4Jc4z&lTgX5bdK2~i9#VckE4^9UR7B?BVBvS3E zc$tIYEB;d2+)x(B#s5JfenkzNSXun!TxcZ9gl9|O?d7YHy*s1)7``mHOT;rGeq7^V z%@>(kTdburaTikVmJL`NF6j@@@bS^mbOo_kO5ejUWGb*&01LEaYl5cyOG*TGv9lmu zkNDy&+|kA!WV=lkJ*kje&vd#o1|EXfjVG|Z(UKiVO7Dq@eR^7%c2~nb3X2ED45B19 zFjjUwun{wrV{vd`a>#F4rZOx39a zI0Gmq+tu16#EcecWR6U3Ddd`qNcFe^tBi_Pwu}lptf<%w0sDLe-oglnYNd0VN;NtH zYDP$^#awfw%O#F6-PP=ZXK0CIW}T@|0upEZLNp4}EqCVp^iztK|0)g+-sgL8gbC-+ z#{r20l+f%r3)U#yMmSy#(T#Ac9W!%w6%P{<4r3Cc<0lH&5XRvU#uN|LFOo?|369YP zUy7F1B|d3fTm_I(vW=ok65+tGjW3q32)z`hUS-VB1PZYu7zB_=5C-&AKlRd}uhv1z zMo2$h;mw*+ncyj0mEqp-T1npjm93#SnVx!c6#C;62RaCi{pAcUrzh?bg_Cf+3_N!- zai?&xbc3;rV2Gx3|777!!;@ehc)@IP;x|*nu``P5bj%-aP?|C^#*H`jg|ai10axq_ z4rEJ77QjgKB%j#7sU`e(#_GZlK=2(&@qbv`h?!8}Og5Bo3Ny8Fk?3w9`$92*^;;~u zd0W3?Of(%406Fn3)vUQXCQ$0seQQtL=rB8^K)e)Kdu+_RvHNJ7gJI9FO|QF&kU zxNwD*$y9tZ zw71ND3^nhjxTC6GK4j>P`uYR%s>%5pS2-YUIkGl_oaBT zr{^>!QH0VxL&?N6&_9vdZc!xlSk-*W5Iqhd+K@Oyv;j-4md4Fkt?=mGG1@(RGS*m* ziu&GcZyjDnYH#iG!mQf( z24|SW-{FjL+Lw64UGx%=&t2mJ{uNIU5?_P0_#8yydjlrn@hNY3Fy$zLDaAsTX#6$C zks1iCli;=96lhJGFl5_wg>2A^(KLW>;0GXEHUZzp@CM?DucbaHO6|*tm=;OVYG;F6 zUbvkT?65q~KYOJ3C^!Hx89C!ZhF4>H@N-QaT)R*IJ26;cd8*lW>J<0sRm^ zLlL5=+PnZg0?+soWgq}v#oSh1Ir z1S3a8)RvjUPyZ^(W3AvY|E^9bzmaswX@;@RRv2<5uZO~_>>|IKn`~o#0`%tUn>@Bx zlkfbD-!9t4YfYl-rIC5(;!JeI7-D9(3Y{ktLoH`=aQc&YIXE5gYORB#0bhKB(}6qq z?O#WO48b&5qb#2nbzBIZy}DB8zu8f)ysGdxQTtV(0UNjjDauH6gFu``guLG->O6wP zBIQMMpJa$`6S;cBIIGckSWf+RzrEtgX7h) zbU+MYB9fxmR1f8c$4`X6pV`55jnvPFvX6D{sP7?;>**eW>xz1I#Z%i9uQ&x~hv52u zPQjb&bMVa}xIDYM`tjK*`0KB~g3)Vv^#G5@{Oz~Dg7e}7{-F5g+mvkNUjU3oYA*Qi z74fcKUMEpaKh#?uFeKa8fAfK&G=|YdOi{Xo0jk=UZ!#n!qOiJ)VOrn_L6!8oTh6l%m+909fOfuinQY45a~^y5y$i!|DA5lo;jSq}gCVD2c#G+p|8och-N%P{PZiUu8Rs91gcAMB zqTt1jY(?enoZC_Y-dWh>yBuZ39V+MQEQ-jjat3psIr_jj5vD~m6*|OV;U@2fgjw&p zz)cQ|QcL}tyrJoQD78?20shyOx*@QnKJiyva}wU3{3|F%fGtu4vmHoq@LrkcOP+YF z&VQM?egyC)At{A1wd_n4k+Ij8z?#aB(O!2#@nK(Y!Up2_uL{mcCw0VL?XiCIqo#Vx z^p+n2G38;w=8wnzhjmD{lrVu@xAf1pltk>EHZX!atN0UswH8U~k%$W7zIlF;KU<~Z zM&V3vT|deL7i+MkJ4!h(GtJc-!K`*Ibi|=q_`@Zpbexr;8AAhTxHI< z&YaJ7G447vo(`HMC=LZ=ktxEF7Fe=87AJ2hUTX4gtI8*o4FW}9vHqTBC}G+fIxG>w zs3Th*jYTr4<8BmQ6o)*JvO3b7Yyaf@i~pm{I{20xq7QJBL}(O|07jgVFea;ni|GQB zyOgU7bsHf^$4}?gKk9;{F8Q(Ly@0PCuU>MIEZ8DnFu%qDS^<{(zS+S>fhBy=F${n!s)ZErs`PZ$n%0G%C;tk4{{;h~-Qvvij zlAKA&T&YYqtay^tyh?-B7gxie<+p8l^QNB7C?!@w{R1aHS~S z;8-kBl7=YVpF<)q3vBF`Ob;nOQQ;x!Ha_B4D~Ku(`4>k#{WM-NjR~{qrV0;VasqRN zmnhf;W~|h2?<#t6@uiwvwhoPRJ9QbUMblQVwTo4%=eF{r(KfAfLj+~dCf`di7IuR0 z&2Sx&ZA!^z-@JZ##Xj9;NDJ6x9eDQ5NXOWC=A2)%YCmw+!Sp+AR!Hj2wG#Xe$IP@QL1o`j3gb!W51Y>I-#bQ$=wsq6ZSVC;te zIE0?>1Y^g8-QtK9qYb?DFSzVxj_cgp~DOmUc{SA*m{1B|qYGf~8_% zfaz`o8l9_vEF24WBTcNNsx2_60#hEQU4pWaJWt3@3*`dI|H~hSsF0j733X45$yr~K zkg4I3yf8_N7rXaBv6zRk2ug$xPKLNOZt@n9hdP*kELg?b1raXXOy+hkq3N*OWxJsO z-VS#K-=2-X2z)r1F1)~U*<0PB7;<91dN11A`Av1cPKZ_geJ2gA^5Cugv&2v9E7=Ni7=PrJ zSSc4kroTwPMcK9(l@6=l9siB>@n^F9nXb{#qT%1)9p$GYlz_hu|0<&kG9CJ2OUnyG z%P_Rg!9BYq)ULK*OA!otWP8o>R%{tB^-fjtIsk()ER4JwEE)cfv83kn`3sz<6+tmE zWSR31)tMCivPBuqdsNG@Y*_V+H|tz=5|{X(Tx>FjeX-=HZEPV7-yMN)7sCw>1b@pg ziRGn%D)zY4Ais<7-BBs}G;fU38b`OBLLE{@Hb~r0h@uP$U_9Zqe7UIJavSp_UKE0- z8tOy7B?ZuU8%0MTCe^zUnaac2JEBK`m+n!aA~ij*5C3*y+mLUhQ!60xzf~nH?(ch7 zVu|lYat$&)7J_WM7;?uf=Cu(-2DtLwhQ*f7D}-X2iSnEl3ac?z$xWbwtE#M=e_n~M zIxQ|nKa&6a?(zsEH^C7=n}qJ3;q*v4!j6jA)1#uyDU%Je0f0fZCQ6CrC1&HT#K*qp1KUSoR$6jZG3F5{3v5lW z`;KIkGgVO?f#6uHZJftIGJ200lqHFH7B0!p$3^wXNhHzc_{{?H9fknhnh9+iP&uxjU3mo^zU#-PZzg-4A7D>ZX*)~#|?cFqdUBYO~ z_whT`pLg{Hh3KXgH^_%Y&~rZ%XQRkA2_d?jT zgDG+nIb;l`U<3DS|-cQW-}gKS*XEzL?ws0(Vf#0 z+a5f^d9NLc{W^G$c7xM_ssb@M8YH6f%4Rp@b^DJuyJ7zJw|^OmxkM}AHrsp#DSra9 z$>@>Yh!!6<8qjheTUpNr-cM|>WowvnpML!rQl2QL95@OIC4e{0%cPess><%f-#D%i zr&R?)P&?Y75N~VG2~^Ob{DKlN_#SOYx*HVh4FbAJmKk{Z`t1AR0&*V750-WrMVmw2 zZ^q|NI!6`AHKc&Gl1J4ftns@_Iy3wqq;h2Ijx-p6cUSm7NYMBVr$v~-**maAkY6>k zVpG5itjM|~JF?|x8JUW>0^F_4bM-hNAbTZ8v`QaE8+(d>?>Xn(3T+Z1D!IvVtHWJ4 zgKDBaqiN)%ezuc%15;V)><_VbCApvf=2e7#&J&+*t=j5mIPd8;{)6mzN$lr3^>@wy zzsI!ggoI~%%Y@X_>`0MUTGY+swB(yDve4GqMVy~NqOUkA(V1yi&Kr<3W) zk^1YLmmU{EQiIdM5B!?F?{T()G*}Og2K@Fty&eDIO@>nWw|)T^|E|b&FNY5+;(($~ zt%}RM11W`(tz;utHGk7LsEW&%?W(7?1< zDvz>DG2uJADbML#oL;GKL68Sg6j`&B$z)!IKvo=;;hHjhU!=6ymPLzWFbcExTsn)L z&qF?Q!LI!t;TsgAEE_V55c7ZW;^Et5C}>dUX8ezl`rJm@OZA?AU$<7va7OBMzs8j1 z>;(%GUw9Rde7bmS=&m)%q-YY9EA$U7-cqdtRdDF}t@l zYJ#op$|qT+lDXQ3=t{ocvqB}5`(2+BXk~ROWUba_R_Z_vlm}gx3h6zsN`0j6ZB3Se z)^y_D*CQ`!->iS;h58$`PaRNC-LqWRzoL1TFm%y7Wy5_4t4OLEr#BiG6@lHEi=2}% z2tzlV2F`r3T+YYyz@G(Zyd2La)5RPi$MwDCNq91z`tJN>x`fd4{K?dVHK`p2K}y|B z7tp$Hl~)JI`ZljgBr=J$zrVq8sH)R2SfikLx8GDR+qXKJI(QP-9l$nGE8jJm^k-FX zKuhR%09(N8kqyyh>Ugbi3yH7!yC&kYEpKMaC&*vRGtw#{BY@)|+NvrMa6xX6JW>l4 zJBC4!pMIt(Lg&YI0~-u?kC@)Tucn+BD#j=Vx?HaPut5G32d>0sEPrA9{hGRkkR2(8fb zEPxST=F*pTG|&rxvgK2)BziPRRQoV*rp|$16GFeuo!;tF6z(5dY`j6(?Y+ z-t(23IE)YrrPQ1oEm~k!& zvoWaZn-RDY$2?sspVUA`LuVd=9Uq|Kke+ZaG_eSTT0 zdbmQg*r~isE!#hDUccmT`M%Z;m6|$5VY)(e-^wj&E^6N!&K2S4FR^+)0LzqYg#KLA zH0E!(8{u66@EuPwRM${RCxX7d6nl~Za)qqcJPXG0_q&7x=99pSCrSN^4N)i=j?&JG z^!1$oaTkVdRg}+5>lvWN$@lQVDvpjjCM#W3)uTq(o?WBhx7;|Hz1T-CgmULn{;dh6 znv*Hbw2RA9#DvZzbwRyJBJ`9o*M(%Rhest|djxWLM+MK-$T(B>U86^$#uzNO?|m;z zzU%FvWg&ZOXe3jdZr6y-xn4X~0xYyCW!cuCu-u+@U5W54!xq-(NL|XC@mPpZRo<61 z+K&JfKyap*77C>kkLrb?^J$Gr4}?KZq+6sNVl;l zIVvHQuD%fv_%x4JDGbmhN-+>A2VSe5f~103;#GF z;qb;iev(&GJN#FLrVYw6xI(sw`Q@8QiTJ*V+PmLWPGBIun{4nG2heZu1b)ZgZ zZ2))Yt#y6<-{p-ZuX*|8B@7V^)&PZ=-%P!VbvA5Jb zFm8Q0)vslFr(Ilv;}GBAa0?@5s=QYv%XulujKciR`~23%#$%5kaf)8>yB!Q6ol93756@|JsX*5Ij$w;4Gj&+%Mm?vC^NRx^mk%M-^v@lPfvD4hDU`C_^} zSo;(3p0gM?>*+w)wI5;@?2woBJJDc zVQyr3R8em|NM&qo0PMZ{mgBauH=4io6!^wp_V##N6akVT+1t)eyL)c-T-tq^iMPMK zCJ+fpOj9I7P~FqX_*>^S&g-2gIg0=(krD~s)IBqfv{sxR2?Z1iDBy=GR3QpkGLI?y zyFWQukT_B9$kPAAem|~f3e?SvsA(qp15o$ON9AY5 z5)%JG9o*J-=f02+34$;oi5CX!XaqnKuc(vG1Ez%Wd~$Je{PM||t)eK5lOymb{rS;u zF^42%9>yMJN8sZK0073oB?*}lMt4ikW8%^ya5W;4_m;-Y3xgwYgGMBZ*8haMqABXg zr4bEW8aQdyqcI4`k{$skTrR_41VBuqkaOyaw7)?m5q5db&q zCR9aLVA=+AVlPVgmuHzeT>SiUvLa-44tJtsW z$4C?}FwVkN?1=HpNp5d%l}!oW{ZVok(IY^j$oCvRAxG<>vJ_P@N1s|%ewUw}_1_Pj z>pi#8u>Px>uI{Y=hJIN8AL8>ME37xCEI9&fL6Cuu?3w0ZL=B{x)0w7Y4N`4Nw3&ve z3mpq-GpK8}i(JE@*fzA8<`C%M+0?=_N1r;QISpt`66zj-M@U6ztl}}$FQIXS^dqP% zrU5m}MjHI@M~6kD;ZxB68{)4hy9WT+p#LU@Xj}iWW*qeYAwJ%c%<0jVrq35ntaxD& z=oI#I0HT%epM}2X+#P`zv)5sA7E?xpB*l7Uegtj=eEV~z@CGqWY*3fDQ&Y2uflb3S zY}K`NO^2q1p^Hq6EN5om8J$g$K{eGf)tNz6-NZ;8jhrw@;?VbLoU-~A7>~gPO+d1s zVDl455ro2je@lGN1tAA@43L-tmqvbgx1>SxEpQ24h5@4q2xE|co^J6nyQ{8Cm(sV?Y8IoQJ;e1@o)OB}vxfw62Sc?F(92*_+^$`ZS@tRcxvk zm7Q_{rPTm$9)vLk$--mlZ#n-*%S2;`^8B*GE7bjTm)Sv6tMPgh4_-Btp}O`zG-3&ciTy>iLx2v4k#N5erWEmw z=WzB@lrFlFp1+v*v-oxX(-AOq4XwXQNIa*>+2)7QS6_k4H>Yooz*Fx7pPN(ST(6>W z7>w6ble00RK`Qwx@#PP^)S9&@bT2CUvkH#cvp7r(s-w|O=&zRa#3$bJk}e~kB$RXR zP6f}R0r!X>3;8$8a1|tHBv~ARN0X_S1Z3$I7Mw?;5g&)MIGl2&ntAh8ERG2LhhKk< z>Fj_0=j$Axq{p5(pb2H^BIbq;n|kN=hK z56LPTM``nH@_6(W_;aQ%Vs23|rG9uj5(U=N=4DnDh${F_%T(6_K+Z#90zct0;{)fH zs;!Y|VHxrmNJ8+}^ryc9ZwBtd6}a`-BK?*{)bVC_>31;*Z-aH^XY0D16-&b9cGZ^) z%89|uqrM9=Nixo0w&KjfnEx~HWT|Q;tLlZ|hf$w833b6=i_QJ@Tfx3)V-fl;%WL!k zuA=F3T$D+v?mF=T&Uvms^uy+Fz;Q1L+|3sNi~(De{yBC^|9rFx63++G{JqE0NplCr zSKxpD^X$#V<+JlA7w@kwo}B*%#tYzw4)GTuOa2qMAz(hG5kMgQM?fEqHj9l*yk660 zJ!7lq&HCqinK)!L!sjmFXnmhThiG`~3#K{)8>S@D@mDWs}!y55GYs6+x zJR^+VhH-iVPAE$v!q}t2&sU7b;v~<1F8*|y*=2Wripo{SVVFD`(GMO=ykLHj0@36M zJbJ_-P5So;04Js{4HA#|tZr|2NkVc_ZI~Eu8vFNu{u6u+l(*vWx!XhVaXmdA(Pfm} zJpzxxZ@>L}MV;B7jg?1DRgY+JlQO*?ptIwPi+69%Peo6J0Dhu(=X93$O-MU!FK?|Z zxX4Zw8e`K}kt zK}4KuGN()#eFZL4u$|opV1O;C?}ND?PQj8S&cX}k--4L>B=K%2h)A+1d`|**^c4u` zoS#U**HKJo-UsS}TQ6CF|Mge_Zvy`ggaM~aSppG_f$s%W87Ze1?=O-trlYUG316bX z+mj36dNCU*b1#|j{|fd;%Jd)cg#S1HVlkhj|H=Q!Zi30CB4G*xGtZ}N^o_!9qtQ3Y zlw6O#QIcge`sV+Rz5;Ja?1d`^UYtH*BPEK%zfmU{DV|HoM3jrezm1d|=7cUy>wfd@ z^^@}pUMWB3{Is@7jl@r%$%h{E{=j7NX^ZbJSv`s%B%z^~iCZH%vydooVAj7Ur; zTf|sVl}Zl`!0=`xW2~WDe_e3A@R>&fx1`ze1K}wBpQT zY(?25E&urONFoF*5dt0}1Y=hSxRnsx(7C2D5I%7q1Ys~Y2*)ew(2Q;}2<7?sa2VMa9y-?r<35{pOq2B^`MLB*9 zI5&wm6|iSX5=GW~DCvE>NnFu;GgbWxU4oU}Ul0HBDhbEg91!ct`IF<*S5LsN?AnWf zE}n&ngr5Q!~nQIwMXJ#wqy^=TDA*dhz-h5YSD`P_5$()f#4~Dj6en-(#f8 z$7o;Te^4QczSc-l{5VLATPvNYu_#BQ+ums_nu2U;Z|YVp@#CQ0z>40K7OtL12z4A$ z)HI@XYnS+OkPOrc8NgODkc_A$?Mdm ztz;k>QC-@by5pqyaZqoxir(nO-l#o#qqQA(+|Bl2Vu|fRbVnwsK^V%az)+S}kQAyt zE=nYYq`i@0C~FXgvMMl?g^InwJ$j=`dm}?b)*v)wRiGgY4(tsSwjtB#X3j7Ti8(_s zE0e<@9A#GEC`%nG2P>09w_Vqi*~kR55;>TIu#{PWrA)ghhuZUwe7(}U*@{hFVk;Jm z%49GIfteKu%(RL!=yyso^>!Q1Mh1F=3}oob9E85i3iM@~MH$rYZgLr*c51qo0a6=e zAj53tAk1b~U^cUe*u-)*i|u0?xP!Fsef(h1yE0CE8s}%CzN@!ZKKi2f<2Q0V{D4R(8FM z!6gNyy^#S#JP07-3UGvr01@^uxxOY5S;-;e|mcb`H2tMHo_=HRFsfR&V>OsOX zP=E)40$c$Kus*OeQs)VlVFEk|6X1%S4wo=N4}+wcP0)@@xPe<=6Tuzr3Ao9gfMpvg z9<-6-ij5SPHqsteQk;pQ+wlP#4aWy8+a>X!UDBv9FJX0{7z`nXj+ch8?9!0nRU!ss zkafwZ01JlQN(^-xA?=B5GjF+r)b*rdGdGHxdCx0QSnoKg^@d4p$RL0*2m%-tHX@@4 z0aUA>4784*PHO;lhRjCPa-pu1K?MvliZ&v(^I=Ka6B$e~2Ei1g0;U+o{q;nKQH((t z#i+n2MiHa*xwE5*sR_H8FEMN|Um7xW({i7$6GMf?!ziMgo|k>F+7a5Q4X0B>X3H=J z*)og@glBAQ8M?&vD3yWH((9JXz_6N@X&D4-33TdYPyxXVSd>A(W!h-zVOYz+Y%pOP zGW=x>!e4p?{xZ~}4Eou$jFx7mjSL#*fi44I`XKP7SAZ|wZY2YW<67Do8UAVsTkASg zfxmRC*qL1^AKVPo%>rtm1`DVz19$o$ zaHm&*JKZb@xV!TUWica$+6~_sY6HI0W%#aTOhKI(D)60-i(=@xc&Z(zg4#3{WXQ0k z^Sw?6706IGiZbZuI??TJ8;EWL9kG-fQ5Py7IwE{B1K&G(K~u1^d^slE<=Vbtp#;r zs6d7~Y$XQyq;7ftW+Q_Jlaww)hWa36s8t|Cy@(8Z8glfO2E(-saKlMalOe;F7Lz&| zR3JmGhz$38^w(stP#XjbwF+3M6=7lbGjH4Rh8-7j*szdmGHj;}!gg8(w$qB(u6w`) z%KRRBN8^CrWE{|B*sf(DS)CXvu$_kGVrX@zr$wRPRgYzzkwG$T5F|rYt5y+`@c@x} z){tx&LW7neRIv;pYn!#bEvQJgRG>ji1*%vo&}OO7`o^tjEnN@!I-wa2*dNKXre%0y zoeV0p24T4j_Hp+QWsXj*<7Ee}>9PZoofXlbvm&ZEDVzCFVTuEK=Cb~^vi(Wiq$BlQJ78cZrE3A%4+~+dm0?Hr@@Ln4dO~!v_Ar9 znHaiR&^4_g)CbD8tCr^aIx$piSFpHUZG2--DM|Ql<+>tYHv?e+SV97q_+dZ+VYk%x zg$P>e&{_nrVVQ%nU8v>BvrYsRyAaf+BA_3lkWmnaVFK1!c14o#FaYzFCxp-vd9Hw8uF8sP?R;|& zW`+USGC#mt1XhzjMrPO?bndJ$Yqk=Bdr$ zLIfS}oj|qKj+52hQG3-U#4p2EL&RHQ)qt(UEA7A9F?FXZOWkQo5+j;J5+mZ8@YW)< ztZ;#3i6lirbsF4&SsX6G-&d6JCouU_9-CtPu^V3OhQz?7j!&}0iPdEC*(;>mF>jYD z@^%$X8QX~%U!|Vt4VN*j-!^ zyNk=QyOkp>9Ro{&W@g(^J1!xr?CKhpMdso`k+~@~wkzbYndwM!rj^KnFQw4#7NMM$ zm&*ayox#M9gXCcC$^qL&IdqKjv-m^*LJr*$U#8_7u^Q1y{NG$tUcw5wITF)PzXJ)2%*R25PI0zePSsvOO64}mhf;b z2i&kf)&}6?K>_%Xkk5sd@Ngpo$<1^u3*E z=P7`lUwGrQS~xdwM?{O85N&Oi13W0p0j|h$fXi79WO9(tg>D%qp)}(pmZdnrgHjye ziWCR9oZvpr1zbq2AmrN_QP~PIGC6e9HAD7*0+wYOz=JXk;EGHGxR7Z; z$e|w&F*;%~qX~;?GCbNclC4e#6?jxL3Nom$D7_>s0ph7}9+fktvoNOM`~-n%Oaf;y z4rjB?UBkap*GtIMr@{jFS3np@79Im$`u}wOJ~J0x$NMQp)BTj%+zxn9ZU;_X0b}#r z4t1hyRwF%=LpKO#m<-LuY#F>fj4^_Xi7c6lU2t}RX5buy?xuE>_lfbS1p z;H;)33FCEWC*#`%f5V?|F!YATcgeyF=F+~&5NZEhIk+NM4ld-%5q+z*#W`V+5HFxH z@Rnpw!F=JwiWe4J-c-zIGSn5A+37kadWA+4YOl@0g9l~d!4+9}a3KqikWmj*DPAIk zdPh{LH=)YfOgwl{CLUaoi3b-l@ifR`=k^Pq107E-hT5D?ncU)Hj@&J#RGEbDhS{Hr(J zi9s^l*YZkLUB4@EAJXLgt{&`eVSj1)hE5lO-p+3Y26wMvi8KS*J|s5fgaSsLRqQ2q zAR=>`?_0$83#)rfXEdgPBNDG%o}8SEzIC)i>bgK}G+?WkR@YBr3Zj^bP_J7rS%8}Y zoJ@~Yjt6F8%>OL04hWcfNdbHm^2JonO7ZI*NMhmzqC?%1SEc2PFm!9=J6>DWbz4$d z%W#8rWw`X5Rh2e&Jb~!gl=ZdS1x8)hcG;_~yjvcVw7i7Vj#n*pv=hn46@<%iN}Ox1 zOA9CFlQIZzm2|p>aZH^AEW=fhL?l^&rN8NALZ+^Up6^2gA7tV{*}(@6I{3hfgAXhod@5X6?Y5Z?OS-J*oF%k+v;S{eRscq#IeT>S~d`}gIE7_ zakwH~94@4b69duW;MISpmUUWo;_9Cq4p$_H!-eEv;fjoI zxRBAUf$x1FA6chmR^tA7&u~TFGhE1f#yee~(6Gf|$)HioD~5G^S3n~Oi+tA}>nj#| zuVJT_0iFIC+wgA2HeATqCc06xTX8%>=IQQ~gn-=zj#!wR2StWD27!)>jn{6`lQL4R z(<#mB7LB1<4bd2~-FH}=d`0?*q8QK?yv)I46o*TiEa-~yJF;yMq%_cd(1rGjP{7JQ z$QMGbTk@#1e8X)Y*=3(WzMqP#K7|g~-{0TraK~$ITGKT*sf%>b(XzrjRP1m~w#(+_ zMYdH9+o>u}gmR9nhp6S{!1WO6O*me*Hw@`;)ecwL;jM)vTRDIifVU@?GS+3=TJK%W zP*BzEQe~`X*D{vgJWKhMJuVo`xyOw#wp!AH*%WvzJ!Hm|T&HE61qtS~uBV)#nx69C zhV*o6R`U9aJ*_e4RvtFfc4VEXn`!*FA)QcnI|1dLs8+3x(eBbj-kdK40xMLsT z6;}2*k7nWXv+NaJF$!2h5;|M?J`e8;+_il~$fKJRL7LH9uw5$dD6}CsMV~m=HgjKz$ENRtZnIN%8+^JMjb?{F7 zI7m{sLQ+M9S8+{52!h1nDsZ{IEJb)Roe?L=b*H7FVJ#piJO$ajj1xen+#ciJkiemC zG1N-ym~Bf#xDXt-ioi))i09qQ>g%|LB8k7HW4d#gr8_T$)<(XUfR!s|U*beuAo;}W zc3nk7lItpB_+>MzH|plpM#ao3;_mt@9a}Q(7)zyzSgPFxkDoG=uy7wn%+-!Eg*(yE z$G#ul0u~WRLPZ+R^n-{*Kvp*pjVya-TVFGgqRHFUa2^) z6i+K^3#3#x)*Y`&AlWqu&ZqZVqK6%QDLOl5}_wc&xyV8|bJOo;2D5!t*#> zMd`Y_^cdr@EMWjHPL5wbDJ;AUgtG#ok#$f8BL|_#3J|GPcCh=bZkZTjJ;-{4X3OB{ zFf_U=1Jp_eQ!fd~(ks+=1a(DK)cn4>>&+=kQmBee&7A2tlT63yFS}2{J0QbxLnKp$ zW?M<7E`mW*ppnU-<7Tg`MKexCPE7vQV^MiW+b80-&$`8`WhC6DGKtTI3so{&y+OBL zJzDDaXjQYNOW4wfux0GJlJqLJific1`%vkO;ddVCEs%!k84}NuF~qZ^?>cIYl4nV+ z%3^x#k|^PvU&br?`uHN-1kO)tL-TZr=T#r#dDVCQn0m?cs#XPfuWx34n>)(fRpfgP zNhsS`#Wyy(O}JXxYu?YYvyBG)*TPA@&hxf@;xGx*${d<0s7!KoOQAl*A*xr+Vzs;! z)<|ySYb$Q_MTx8!UBia6wF}H|sJ+PpJEkIlA{7B= z;vzd0r+mCvMsYgtFM_*kupqHZ13qir8;^zYofwF2&r7A{>jy%UUG~=oUG~>1F8gcc z%l>L9W?lHZzX4})_&4e#<0p>qMT`RNTmCHkk|dr(eE)89k=sk?a^u2*W;ek=)7mv? zY&ULvo81YHqH#=#yQJJgnDdkKvRP%a`OwX_0xgk)e!KN3MLOtPK+^R-U%$8uYjZ`w z59e9;yTLzbmI7ZS&`Qht)a^J4`E9j2g)uu;X6id;pKW33-|`2UkE008W8w;N1z|#x zT&uTyejVQdgxNcQoQd*Oo9$IG3}~cWJ(WbX#4aC0SiH zSsaTtD2_#|h-1;paV$lpE(a+rx)m1ZNIb}r3OMz$>%Y@cGncN}07ZF|EmLO+E>ya0&loWy*NdmrB4 z5PwCp2__`UgBQ|YlLgHp;<+E0%nP0~rev&jbJRf-w^D<#SiT?_=MZm;Ro-~V7lNSd zg&<89hNBG%!_g|jaI|t5j#_o4Qi9ebeW)|9YJmL1nq ztZvWo439G!vkaf+7u~(P3|GM!Nfx5nmTwNMn>8ffbxjsLqYVn4(JF#xv~uu_ zT9v({#U)iu7X6|Pihj{5qF=Of^o!c+5=V_a4|crB17*+VX|iYQZWP8U!2{6dI?wK@Z@Eolip3}&g40;VhUKPO0ZqJr%+aI*+S8V#lJ-=)Dd+orAW{ik)-4ajLc?rmqgSsQJlO?TA}cEV&_|NkV$G zAt625uBBKjhV)2fP~}q66uru&q-hQ^u`49g@l8Qh_NJgFu|R7>EYR9+?2lHoK&O&v z8SJEXjOtcp`K&cb=#VxfbV%DZxogGHp-vs{2EU|_wQCYfxi-X7uI*aNwW6gw?Qp#t zN|RWdwISAKq@b#0No~g#r>Ry4<(@?CJ%#|GhnX4cIE; zu{BA^ouJ2&NTpX?}~&%#Cgl}j^Oby5)9l!ac=k5UiTqkYBJa2I$1ODJ(cI0GyRo$I2vdz0ZO9no$_02`~7zOAj9 z6?uU)nUDb8VoG(pyJ+LxTyW%?0-oRj@2>G+o)ll|2BmAE$qtclQW-9_>?HlI>3jRAFEA% zN0E zNrDyeCqJ(|=X!jRkU04xQlG6nm$He9$G)g;%$K*v;P1RxI@}4Er-hWfm&Z56^Z7l^ z3|NPm6kY`UrowEMqyUC@j%VHU7?_8dP%ixO$;{f@Qa$|L0GRPhUNGc>PDZq3-BE(hvIo5TCD7J&Qwk<%pp5vur+G{QPn> zN_CcBP7`@aUCO+9AQXPOp2E}xgl%2;CQ$^!z`s+#I|>{U@asSG6^TiZ&`gnp9)sI3 zzGmW%FH1<^j)@-znRle9B+BTUZ!Xt#sRpKXE{P{#ybGox&~g>AB&K8uqU_!e&uSFh zOP)Qm)FA<;mUW@?!?4n)CIpTXiU2Rrhwi~oJANi`uLk~(iH_eH<4)A4~t2{x$jta^8Gz8k6{LoUN|qg%*6wvGhj( zRqmJtA2~ZO#0ceAy7*)njV{A{=r$X|_7(t~1$C~)x?fnp0bjoRt@voXVP{N&@o^MQ z9`i*WTt(U4%WuJXDER$>IM;k~Tm@cTFIJq4ehcEz_jyWcZh-b_LN`5|#o_Ya`=*aY z7w9-=Wi0sE>ga_qqm4#ma3;3c0xvr|AnV5r93Q)>Fvpt(V)7WwyqG1*Xbdj6ic|3G zJMY@7YvJ)|3{EzzoqEg(V|P>96<;Xx`6PME&Mu$7yG-Jg=uJceK)|nD{dy|uXgnT| zj(s1Td-FxYz&T|!zM(D{gUba4g>^5xJ@~sl5Eb_SbjclO7a{iw0_6KYRPoOKuOo;K z`~O3H(j7%S!1z2J{9>!>#`Z`U8^ulh^l(#rqS7IZek;CNQWB(Jl7x4s z*kr~`3X~Y-RzyxK_Dumcip8gQc{dcmam_aS;MVhfj-u8_jI0UXyi0F9l2EbxY`3J0 zehF8+f^WehAC4&n`~;Ha)7$XBG5@;x@ub9diilEjmahK%=Zr2r<>WMlVG}!1K9xR# zpJ)nBF7KigoaECj{cCeIJ%=j07-d|7Fr$xL80j8JVP z(^=V@%g9&G-dtQhJAZQV{`7}3zyJIvP=taPPBf<^A=4Cc{`T9W+M2E|o}9O+>x$8s zXYbmoix+$vhs$-1KfipxuKeuy;^N(#^HYVT9e9{~YJ}%?7s? zh(lPpgI|Lr^4Hy@A3TSYJF3RhZ-r-%JizKJsNg6Uve}43kGYqL+qzxnSokNR$od`qY^e+VmIHcE^uAoENx>Qg60r+*bf z%ATLkaJ;B}5&G`>75XgtFoli9eq^;4`mrACx;~s!mw0W)ab4412XbBO&PZg|1`@Ti1t+?B|A|%xY;TSXQdDqLwdJL)iA-Ly7w)@bAvU zFnQ|vl-;p}E^AR|mPJ=t5-(7AV(HDFo6XD6HPlFwka$j$vwFgt&|fX-iBG)cC0#~7 zN!NdODj7g28GnzE$9|T!tI2MJL%w@`9`?tA{jZ!7V2^Fc?SBaBs=00d)9}In{~({Q zzzc!7|H+g1vEN4PX>c?GU<__Z?4=rU#527Ue*^#!3IC43qm%U|x)&+XeZ+tC$&~uy zM*)+-8K(q4tdb-QL?PxZ=#m`qzX3nn9s$>LlI)9x=ejfyD^m6qNs^f51ZB=Lon8O7 z;Xy3Aj|#sO5+WRdM|86&i|&DGfl2Wxvs%la_)ynN1XFxzEBz*VnJz1o1f^fHg*qoH z42mC4iT~TyNNlVEJEI}KE)PVN#EI+j#hm!>gU5@n9I9Efr2PB`P9 zZ9gR3TrP|>k9I1`MfG(qrpHA&UEW1>m!?WmMR{e{qIZ8@3$0{sswfx>f3#a6Hu0gs zYFWjA5S_oGN8r)ME>+dUt`tuj%5Q3J;C{F2izb2s*SQ6)CDV1qi&H2!Q#VYbO0)Hv zxPI=OW~I+-OE%3IFGyt51$Lbx#m?u(+6UF4%rbkCwS6x-R5n@Pmlov)>~_;JFMR}l z@_c`7925SJDV>Ee1-wN1Wk7F17|@FOvc*DEM=SU!k{p2(VS`T_VbWFj6UPn7Vg%M^MnDoU3iYT{GbMF6F8Ojv!=JDK5v$kjKK?TkO|}8Y8S#9(G)*bV&Vs|s)@Jzsoxk|_qv4yDx^{O z^X?f`QgqY(w8wRQ6rb(+;xX~K8~qT4EW78h2@>N!g<^WJ-O0E6X%eLP$naO0*-Xm~ zT|*6J8*xYeX*kC1eyR_4tl~7c`{^Q&suSPtM{)+NXujR4u!2x>PTc*J=4u=!p%eOz zMCDmqbLy+$td&H?rvcUOem2|6<;htaZe(zF_p?TI&o3{}TGDK*Y)aaWvm%O2sV>@* zRW;d~c-`jZN#8EEmVL2@SEsFsw%cn(TAbrS=+d*MHCcS}IsQ6yvkmEM5o|>K$8Gqn zTd(IdVcDYX=C|%rwiNItyF14`m!=0~o?bi$1N?;PG4ML;!MEbQCJMqBybOu^1M$=4 zExsR3Y+mujXXyn;z*beYU1{>+2w=m|j822N@s)HK#!F5Fn)g}p*+pkw7T@*t|9V{7 zT{nAf`mf_iq~G_#fWtIU4_%6%`x}w+PFxMHDL*xKhuC~y6-Uktt<@g_%6nwxUf8(j zRqt)Z4lP2KWULpY)2dVAlXvZT$dYlP{MRSpGJ9CTeY`h2@GhpVIKXGWy!2SIb9k?E z@0Et=MUc>W%wzn{@?6RZxDc-xh<=o(dJBSFoY|LLmS>wp&G&l9a;Fu8b^1e@!Ccm5 zn`#(mC^_`qlAh)#ZKd6~?wk&4ohv&Br$RdG9|-fD->QGhq3Um=QFVcAE^L1Dg7gf} zcD~OY+&dE|$It6$6L$1^jhFKxTW*l`EXaS(ra}Iu)~8+ywtV{)(`Lmpzox;^|X^`{i+$)xNVsJb6f%kp_v9B@O?hTxO%&U2)!h4_Ry zLV#$)}NhAt6jH&&5Lb!X=;ayX#A)L4}2D+YYjQ&$GiCvN>%Q7Ne5R z-qU8orFq3Nw{?Z2uUHvy@1n-E#EaAX3et+vIIVU4rU2P&L+v)7ZP>Sgci5`$1HVpN z*9rckycc|&UYr)9WAD8`YGrR`wOyID?uUp+$^xmw+W;KDe3`%N)Di+nN1?D|@67sw zf^3Sdlkt?kB~?Xvay9nb?>4-%@l&|}m9IT}&j2C4|7Bnkn{ey?mxi%+xc~JKpYeD+ zT6iuMm%WnE;i1u^&HG>A%}sh#PQV*}FSh6q zoaF9Yo>XiZ2K)}=XfzsSfrt6$WBQ+09xGqueQ}!oBqGw&KQHJF<^BH%c0W%(L_YBX zLA?9<2wr-@HRCr%kH%Y{-EYR@qtcg0)kSu{tNC;&Ir<1T=_U$bK!~9zv!5>Bsw&L> zbry#XWsIlxpgz43ubwf!`mdok<7HnxIel^U3Va0Lxilf3&;IlsTP>F)zWdXY4-pAm zMNz(+z%nQ+kqTu%v(W_?VT(yynT(j4r&YPBotT|d^gEO+)~=#ku7bm2!(ONz@bsX*4x7* z3f*!3k8vKz%_d*PlqIp}B-DNMr#)Br-Guxp75@&yY-)-%43`z5|OFrdx=Lyx*9hQqlmh^)XO*TT5H8+X>w-M zC9RA{al2K`@w7LtD+0)qMaXCtwjNWSwTrquOu*yDbLy;kj-7_tE}g`EXMM^f|Kj-N z%k_k=RD)vwl(hGv_t^t!JhqxEL3?7^hr}y}+d(#>Dq0<%z$S zD*H}-t@YH`4pYB*>hE=-KTP@G!IXz6``7s@U^(ItC-@$?hmUK~+9U>=KRhR_?73M$ zJe!z=InW_I&-147Bm^|z3736JSW>^}I zKDpBah#PWs2xl{HPP$wB&r_YEcZI~WD@I*FKREu1c{kL*b=OXE9g0Qk=l0dBK0tLKlLH|FlRr-oQ0KhR@{`hpGmu}`**eC^6Mvu z>5E$Xu+TnySijHd`+$q?VcLF@X=`WyIu@pnC=2~fPg1KW63?NfUp#wp$_KEkb>*aZ z2Fy=xvoN0WyXwM_l3VEcOeM{X?9AGM(=nos(l95#l@u-T=W`17>o@-+no19}^@OwH zq~~vvCUj0?Fz0C>;`HPifPLw}@5sE5?AAJBSL?_~JkgcS%>3TeDNRITzv54u+ewMD zle(7pkr&XT8%=?Rg7UPq$fmBQTPjg0)wP*PX4rx=>Kd*-a}YEPh{<#Y9UW5QQfzD1 z6k*qLYzH}}VQKO<3vd44KwZ%`>2M8Vn%JN&ai^wc5d)isY1pc3>6#8r3qu!~7+KED zz%x3VB7FI75oZ#?ya^xJ?esp8DN|KcyQ)-lnG zyq1}{mndSk`d+a5!0RMD)#ilXf}AYV|73$UQB@U=eQ!FQj#=nj6W5IqOX9KcNpsi6 zIEuZ1<2L@>6mgOif+!J5oW-US58CYhI*-Ny^TY6Z6^$7Qyu|wl9TVRdjZ=3lV({5G z1qmCD26ui)v$D?nWV*`;|98&Mc>UnMhA}L4p(}AMBf*WU1RhJ2d3ZCqS@}V>3)ZS( zOM*J&>8xVEZuvomiL-CHLm~akR4i3d$FT}NuK$Mjzx1T6^jLaQvihZG75fUK0t}UD zltr@i3#&{+$^ETv<$m@euVrSz9hhN2xx`{B<|Q-`){wPnR9bAvye;>wB|&Y2YbR4c z6B0!NO1d{53*);y+hQ&U!YXlhEib)(6PjsiEmS8hc2J#`s)Ii#)#-x|Q?eea z(-I%9OYT*5hTubKe`|HZRP{EyPFn1sI=Slj-t=&`I-IQzXRF_VvL23ChvU`Zc-32X z4kxU`3F~me>Z?76L)PJtbvR^IYY$`od&l=^kQ`j-2N(Lmg?@0Me*zc!KYVXmwfsP9 zj0{yn+b2h;AO*s4tnsA>DG-UBy!+B47H;2TSx&Oq%J*H5IewVV<4MZ;pD)L}vPsA`*M>zksy0E!1g+cc zO1KvW@C5c_08i?br`48}&+LvnSx&Z}ootthUgWjR&^RUuQHZ}Jn+3_59KXCc&TVKa z+`_2sX=KajVm0L=ToTu(@g!Yec&xS)UQ)Cf)>T1Z+2yrNxnhu7>%ud34;ec9GtMx>ZhSS~BrBjate6bRLj{StC z0t{DylkJ?UK3TFk&-l8-N8dX3!IqI%Y4vAotBwY?X4DO15{c*P1x$^dg?B?4FEEM3 z758-`f3722QpU)fPF`Q2Q}pcV+0$ole!P0Azx!D`y*mEIeEw8_`|fAcd^*|g)WdV| z&?0&J=BL+Z=%uOY$4_4B=Iircp1u9=7e76D`sV6~pMNoaxqp!~a`4b1`OBN1p1!(x z{j+guynFWQ_~j3;fB4Il_UwtSqqnC1?&|(U(#S#IBiSyLYe_KF5@sMgR#nyRZV6jc z*0ZpR(qpSaq9|LRucwpemk4UeC~UjZV!bNI?JAeJe1r-~W!%~`UCqD8I?}B|UX-qswJbz5 z4-Hy>(C3&pj#x427jm!QQ`tqC6<{nd_h-;4@r^~4f^$53Ix9J!CmGe`Pb9%4nHANtN-ypTX#|n?* zaL4^}zTEZGib)aTqnedn6RX5^X`vmLSZ)5Pd=8(L(@#l~*%cx53z7_?wamiQ0+8Do z#3mqTj7z0m^55vjKN$h_CZ*DXO)eeG0er%u^Rfy~TR}p~N9}mB`b2`j5ClT`bz_T*&ms6+r`>GHgcq+OUAf; z-2({x=I5!1ICLDd1vU~=e7K@>x4|D8(QRK|$MRl8AZCx)f4{|g$s)A~zmgxEFdE@pX{C`1!Tj`EEaL7zUo(wJQkD zuy`haaGlLH`S0rHN#(cRV<3%s2>&}5=x zkHu2CQYU8r4Zd&-BR*(?PdvIz1m{gpw7tzRVPn8-xeFyqttW!gEq1E#z@`AZNFJiD zy$v-G6^6-Zp!uw{*`&Q=#Nlv$iMaVO+Ptx2z`Kwf{J5b2uDGXxq#-9b@N`2lD16+y zDL-{neCmFzkjM2=gI_B0-u!^=zJ}75?56&gSyok>4NuhtBezN?-kGoNc`>uAZ`PMK zq%Cze%hIMJc0yjawzT0N&*iix=ce32McOQxy4%%6CunQ0lo+G; z3+2dUpu`+@RW>L8F^F57u%St9aIITykYZ1>j5wsTVPIfVXh){b|Cmqj-4qRtbNS0- z-wV=8J9ZL!SHhua@uQs#m(e6OG3L}sG_s&avwQ>lU~h(p>mEh65Ds*LyF=LHXt87Z z^`rCO*Ehc#X%>a~1=Q2AK(ZaXIKc&+6KY@61n)JM^Khb5UZa}??%}ntqgEswRXO?^ zCgDfFxfbeM068#wEBlOJZ&kl~gm226k<7P#T#JB=)^`8}cP&lYU$wVhP z+~j3s2a5Jug9hRc`jd}%mlzqud_=B?d_0q!<8fT#23gxa5R~(*(*OJ-qqVA?WIg@8 zI+H-kRwD;DOP`2ai&A=a&T01kin<9usp@M+&38a5NDclCXM-9AUQ4Q<(TQ`auMA(f z03+9z?CUU|f#+8jyA5-mZ#D6Ao*yp{r}rP06V+7DM>Vfbp2$bYgnVt2vOE1e3XD4W zHn!3pMiYnBh7X{Zklo{omLX1t_POA$|DI`FBi6brZTjyqxez}tO%|u7QZE=XX6fs9 zRY8jW1~*)0VR5QNqBQ9E=>`&27(x{Y#B2#l~{f@0s#S&q-$kV_8yGK``Z3xhImq(tG1C!tB zdnygG${f2eM>|22tpIW6(1dE?xcWf^5&Z_-;>!x5p}Au#qg zaLYs1E9zIr)fnVsgk8!5mA3Q!SZ7W+ zx*hSeZ-whRmYLQ7i1#;M#FkpEb8|%RCMQsH(Vd}BQ$*F4X@%et3wCo%1Uc*$bKs_0 z((uxGs03vT2MT*k>k2*%(0ot7ec+!!cysO!{uK zA#;d@*@vuVh&@@Lfml^phZ9H9N|sgWgf#V0ZZSE>AV+EzpOi~K7TKzT126GBKGt`n zF#8sTAB~T-d%|KLvQpFfA=)mN!~o?3J&YHdXb>>kqV z)@M#Kct~U?Xr-+&PYI6|btx1nW3aj@qhTP{;fi1+u7l~Zl5g*)A5FRHJ|7yigS~8X zgTFt5m5_?!e=sYZ@tdF>ar&v^>oCqGnHAM0x@k+Es?aB z!241k`p$jWlw>0v2~sPl${u`x*c$sY-cQmR*dxo9`9tu6B2P6~T6eb2tm38VbLyF1 zYYgSX)5HkVb39w&i}GtBMCLf0 z`H(|j5Xonj)&qdiG&=Q|L2~b7;Og?S18#j>IC~ZTaxmG;*o=Sk%dc5>9i`5L)t^+n z$E;8xoLYeu+^j0tP~&D#ryFFp%YNPw>oA{Wf;gO#7(vMEz4?bt(mR4TGjilYbp{I*V{K^1h&QD~V}I3~k{9;-iw(`*-4%fzG*7vV_vXpWwNYPh%f*W&P z)$8r32|T;e?LEJ!7ryq&f}b(5W0{E|T0BKZPLL(%Mx*mfMQ7(Ym)%+-G2fg_I=aIqgYPLX=np zNH0RWl0xp$aTZkSpr@C-r18g;NcDOAB{u+L_!>}fb=dGoWe(uu`s)e!Rt&srY1trd zY$o>G;Ioi_|2j**|UZ;5Z{W3V0`{?Tz=K zb*!U~jCMUj$XeE`E}nfHL>*hIi9;s&EA50MC#U^m&BZvCw9%T_WzUY2T`Mc(wkaq5 z3xH0o^N8QPVUqu*$X%X}1rdr7P1}8X=APew*{;75LMY}Z{76XiT<~-LiM^a}w;RdY zL3VxjnV(YvfhL*h^d`Houe3=PbeaQjy z(N4XXmWSooKddtUsWS7Zc(QeGnm4Lmfr_LZYB7J>2CZR6iELl8ZW+mJ3^Z}#Q<=R} zZsfBnifS&lG-~22vMZ@NPKM7exJv{i`7CHt(ymDx_|-*RHtJAe1oMw+#=#F|7L5EV zoh<*O!7)v!4d4`gZ>+G4McbGyj=anFiYHbTw3y0jmYbO=RlC z4$C11Iwx=1%K>wfvze*X`4tCOGxOENF7EYI?d?IRcCSciB-`)V)YW~XuYsPHOho=x zX*|e5(G|RaZA`=ihs~$V66@4FH$AdhOGqd^%};U;O`A8v8q(pn4e9-_X{)UopZxT} z+nb`nBlZNeWqM%G8iug`cV^b;q?y=e26!O)1@Ym5#5*Xk*{SRCK6LZe@5oZS&*OVE>WgCpp zGke`ryuhAO|E0o~6yI0Cs}S>-%n$q1-2}9r0;7t4*^KQ_=VG<|>-WTs$K_=5TO< z@JIe8HuG}f$l|iq;;VfLdqye?*0G=WF@lz)4~^gv>L$ijhV-a?Q)(E1wc)AP=-6&U zm}*5AcKvv?L)q>Re@LsCeF?TNn9Va0f4Vo6fM1NFiTl}ib%t2z(W2n6CpQSVs5Vx# z>=`_Mk+`3^J0!_5>gos#x>>jzlu28ezU54o!$w}lQ4-Nn3V*}!5vgN&@$Y4S=CP%T z(s)Z#@7EP~?cfHy;^=eJx5xYb>!a)U%&K5g#!iaf&bD$qOF_t}hj#N9mKg@=X%X{lPSeD$# zd22UxsuGZgLYv_;sjsZ*9W~!^byVeL)QKY8@G_`#cH+60=X`S-$W2EJH`hMHp3fkY z9zyWuzZT<9;a{|lp}+Mrp}6VdpXDV#YG(UQ+WKuWoS3|}flr)C7jV&b>WGpx*lX=p zt4HBTgpvk5BaQPJ!Gkou1S6Y1h8g9*94-EZl!0vdrulT+&9vzc`3Y2{7D8Hi_@gYe z>W~ewCTNss$!ZDlSuLIuFN!s@-o0C~Ahf~we0X#hd_?9Q#)YppO#4Nyi8{2a{}mzi zwW}$u4u6nN_PCPBn<>A4^%zSFzN`5@ad@jrLdT2C`N{Y6mRLeki&gq|UF$mRMlWQg z@PS6kMZG2g^lm;Ozf1BOEV7f;kQdzM>vOsH%lq>E_7yQh*W>O#SFQ9f~vr_RtRUiW9YFnW@C}z@b zqzPN^_tHAKUWjCpsBFVtOqaQTGuf*u^`qcFy1l{v9PvRfpP(GKfKxg7XhTFRimW_k zvhrlB?7(vV;`Ke_Zo-TBUGOq&4;=5zm3p!snB=T*^_Xm&xQF5Cl%-bMfNJYbKD79a z^=9L?TxE;}-f>3%_SfKCNu-8Ewp!!uh`$Ma{?L{axkVk%KNpf^ z7Pqy-2~cyPeyZ7gvyRe7A?=BrJC4sk^tb20yoePYIF5QTLPKybE4Kd+>Tg=xm`_>s z+=WEOHgriwY6FJLkx^(b%G==vg3Id@PX@}@ubF_MB7recU0Dy~)gn;Yw-o8Y#1mGQ zV%w^_Ixkt_p&P=(R`KvULw<44!d$kL*XJZVWy&Mf_>4lbxq0?Ux>T{8HeJ4K^H!A& zvLi%L!4k&%L0Z*`ik-c-WX_iAfzTxuBgoX}+1%oiR~_AySZxYea0|kTcZwu;k(DSL9=kczTeLD6%h*-ptc=Ej88*C^!0}nPVt{jqk-aOu~zVMqo`Cg1WJl)+z!6kh8 z+|M`Bd?y5kZ5VZ?r*iFGOsKLXs9$_Qc~TGw{ra7uoKFg7`58@VXpMO2 zksEETu9b;PuVV`M^@|Y7Yl5MSdg_-I(|RIDG%w+hOcUeCgx8OWXyRJS>^nz_K{M%` z$aafY<58Wk{T~Auh|T}J&-ljMdwx#9`VBHwQ`x-TC7bMU)KYWtqu8?PwD*z*2D_yH<711T&WWkHtk?a?bySfqF za&`p89_Q~`xr2!#O%s>;uZo@g_M;`kSF~@j8mZe^*dul+v6GMi!ePmh%HgxGJ5Mzb3;h`eahekC6Mo zr%chG{~9YFjDXqW>SBI?yetZm8wK#2%`#c~aJ_8IqZ(7AJH8%oUAhHOMOA#KKI69$ zbVz19&?Uk6TWIKix>vT%uZ&e)o-q0Y(yH0Tl-{o8+iQIc7rykxBVd=zs5yNUx}Cpx zr`9w!uHg_9tYU9bN-meifI;A;Qv4oA^vj>MeGUE@tl4#nb<1z<+KwxJz(%075o`00 zFmhH^46kaE)zUU|$3=T3_IRxLy%;Cm0QZWLnJlYpq9gq}ECWnq{ZflTAP6K!dL<2E z<)0%WB%c?T5mG4(KbNkLxxZNv!b;}a!T7so6ZsOwNm9xRPG@I-)s^_IuoGOXzZ#>F?NP3fN1(|e|@81`G!;PDg z?g85pNb46@udH2mG#jNk!Hx}nX2|+LzRI_^@439i<1jX>*5qlC^NV#-QeWIWIjNGS zu~CFLhM5kOu%Q9+R5*eIpZy(kU#_7y6J$j#x7sbFso#T^#75m&$xs$IG3;J zn{~Qq=`Rp?>0m3CikN5&IrrcBTi9x!cm~=BxTzqu}|$9*Jd0uV>^#TBBWi4{xT%ZF`#!) zInb0@wy)}G&@cx7@!K%(NTtE(rg*vhfsQC&kpB8r8A`%(YO4QsQ~)8r=Pae^Z=NKI z-;ss$g@ekQ9O>9s8t^pdSNYA$=Y@nnjrH+u5n|j;ntiY32NpdzC@EH0TO{=E{hJ*4 z7{`fDn$Rh_H^qG8tD~c@iKSfo;S~Jz0)6reSQV^i!oJ;jCh+~0+p^sTlKJwRXd^{v zdr5C?d969c)Bn_u;(H`r9CNaYdj0&k&x_cSf@_L`qBo<*fJd=KQmOPCrmuwP-=t@` zbg;Gb_!8B=6jJR6ha=y+H9{x$jN9g-aPzAG8aYe7@CX z?%YSpci;EEjqa!$;ce}tnq-6$5P9dp;z8BxP6pK0K~45i`x>6`=5^LGZ+7LIj3#8o z8^;cT18)Jfv9!LkJyfGGD}k_TaVsK0x_xS?E`A;FqkRyDh1GE|@2x0-Mc%pAV;mQI zF_rr&;n?Sbl49rEO4#e&v7CF!h8XB7j5J)zgB3lCwoi*AGWW+5ai1Us95MdljkrG% z6k|Qpgu^F)hTYyTr6y!lXE893B{_q++YB1iBmK+W4s^o$bZb4&+~sH0JkLk|RW4RX z8%X(aL@TWNu4P)4V}r_JNOJZhteAD4A8BpJGA|tiE4hscAuIQI+uFL{l7mIvYOwdM zzY_{$u6J;~2qtPmgzfT2RJp0f?E-F?TO4BEo5!jE3K@K6i8~D9_?HDS{>rYZxZxnv zjXQ#$_E~eB-7HhNxFqH$3}nlhdPI&j2ASee@^7<(L-~+-f05R|^~x2aKJRX0$%0d6qg(F4gRaw$sI+TBNZ9h&Xwn+tU8fx=6kRCQY~w?sgdq z?BapCq)YqU^3`nak!R&hVSdK9Idw|xJgI9DgEbGY!|pyiCjR>C@8SbJNpKlH&ELCP zKUgBC3@Eg4@r1@F)T|to63hq0TDZ6cY7#}MYZmFn!@P&rPnT9H13D~Rd;(>?hgrfp zTf|`t!vYpTz8si*4Nh8)q$~Q1&|CLP$L6YLh)r6GoqA6QRkRfe2+Wf%VdcEO__ zT{33R_RM{=H7wq2x?TVqW)kaJ=zCFZl_}Th>!$5Fu5LC(q4EwhYJ~-1fvY28$29R?#YftMv8`Y8xF=m)Lz-%~PqtSIH*|glt!VG+^BEJaa2wKZj=n&3Y;CQ6P&1R=a1&(&HonVzP1K0x{`Y?V9YKWSiWx z33yG`!iR!lZ&fZA6jRTfg~pX!PwZ1GN>A8%&{H?0 zNNs@l88@+aRk*0a>Ol_<;ueQiH!Cu5`ZZZyxFrOK<6*!?}BZreZoz6IMz4WtPo&Dc);q&FHhE->U$6r=Hj!lZQ{AO~5( z5b8>T#p=1D-PZ-|b7%Q3hj_D=Rq{lN5)qO(6hM$|Vq6$sxR{S%qw*}NNN4c0okEaN zqr-3T)Y&(Qr|Z+A`_p>(B@_Z*&&m@Ix$`v_gYQm8q*WG~##$+AN6)c#=gfd#j^lwtMEp@J>$W7G0^DTCkQ_2B@+_ExKPc6I zu0w29I%rk$scwDoX1&%St5c)qEP?W%y;h)J+2-H~tI64@F`%krvHgE9A)O0Owc698 zul9)s!GUcxq`;YmOEX6K2ydTKQV6?fsMPmI1Ew#U4P8*ANZX@Mz*EBd8HpStR)q80 zxktloSKHeYvVAhWwv&EoyJ2TsqR+kFg;TNrT|p8HjYqn(V{P+19rxRF9q9&NwL$3v zQoKrULzv{_>!K8fYj1jMr{g}p+7V!$EC-6pB{3wHSph_RLM!YU-tT_LWGo+9@^9 zzT+)ytxD2zdpbAb(T&W@8FryacR94+B_siZ;x8inPLTdxW=_b{CDcloxzsQ+El><@ z2H&+W%FpecbrtQ9v|F#xb2t9763FBD7BLAwte^L^3nWShoRo~~NEiV#%W&Ew0@67v zCY3bz_loppDOAQ>te-OF_TQ0tVOBVM)jy^-$a}iX9@6$`XVIh6UdKO!=RArP{=pMc z+rIHTAsOdDqtNR3udUT{qw_qGb1Z_f*Lis>R;N+?=AxFFltMqWNo67sn$L>9*;R2u zXuPHS%E+Og_K@GR!}q4#D(HUqtk?{5-fDczd@?Bu*e{S zluzM?Py$Bw4-E!NGoD^eINO41^zwbvDU}WH>tU6kwzY-iijM@?cQ^q8LN&t*F0tO? zFfZ9x^*ZwpdvqyaEr*AQzMQmRt06EveCN>Z09I4sKoER=@O~_>FQEov1X++z-o!_i zHHZb=KVr$!__hm9ei;q!|jz7_`L9W~Q*G>QCj8h^e;nTwj{a3iRkD$QJO|sF^@dM@n ze|y)6HC8B!#dVcuAomH)Dk&=o(F?1x&ofI=f`8=8@Pr_y?f|Y zBD`eGyxPI!VktgnVx_ruM;IxlBC|X|JEv+JOb_{0pTXC^@|ZQxQ@q+VoG>d7;Dz4i zFE{zq_RAJ0I6887^rP&R1F4b2yC^g?X!q&mWhLe(F# zHC^dy+7%5R7+s;w@1O&DBgkn=1yDoXiSqwKB_D7~V zuNK#Z<(9=hh~G@~tas+({de@IA^+m;MV^hA+|d$*pO~KRkB>QuYp+A*lfB!+YFmg; z*^^+p3^nrhxZ9$rSo~S;I$H_iv6#^P&BHeIh3%i(OSTlWi4ofE8CoqopMmV7KdJLu z#)c~O!Rzz9MRS5z<%i0MY*!<9c0QG>P0;F@R3d!?w{W0--b9fQLFyY8xBe-i-@|kAMuVLpMR06-8qMu$Kp_IP;` zFM~mlN+>&x*tK(m0*-#L)$idW(dif9v)nyMtM%7>&E`TEx2vb1YkY9?p8kgl-7H_Z zj<5U2K~;+_R{>#itG47_#TYr=Dw$j)c-}sE-lpDQWypc|wOQ1FROuudj4@L!ANW)! zAm0_i%jl|C>A;oP$c4VvhVOtErXMGoXgifX(2FViJ0((QJw!_@ET5J$z45;4CIuBZ zOMl6@B+u0M9GOJJoUhWz6N5{aDGeyLB+k(HffWL&#eQ*`oN=YeIe*Bh>&Oe#dotIlB(9AxmF2H4frYXa z0w5;nglPT4iq~77GavSXH3SQaI~f250sA&{4nn%ErKOWmpF1f@`s^0naQk+n@WLRe!>uKv! zkk+?(s4+&yjds%s*YD9?j~eoRnHCB(U%@M@>w75io!;ED)y~DE$M6{dmfB!nuW^H+ zEn2o)%rRi3l=R7H*dqg_TLqx>QECxdOtxiI;d9I(l0haQ->~b3DL$N;JG7}jpK#6~ zfVtY)Riz7^G}A##qmQ1MVDIi|uF!*kGHx05p1gIAU3`WG?K*5DL3w&taeFDKb*3Ke zN2HUCYVcx+*7ax29(FZJACaHEajF;V_3fbs^;Bms#g)UL<}pvc+9>~;e_j9zYk)S7 z*W|&9^*`gS0dIknK|F5-H@zn~g!0Rj zR6|c}Um7F_y`+!MFVx{c=5Nw~+%$C>Q@`34hSh2F>LPILttn9ZR!>nH zvoq9GLM}Ioal}WxS5VK`R+ z?j6sTmPNc_2|1k>HveyvokHYF$op1f173PoBX|T)@O9Jr9aDwnMeFj8%&8F4#CyD+ zq4{-VZe>sXxauUDdP3a}dB01n_WF}W0OiQT=h5u^FBU;dO_)tpULU$sWlD2tq{ zW09|JQ`kp6m;D=BxFh?rK=I*s=hDFd2x)1FK%fbz-(DWaCkS7NLMkRfwN>~n@Sj|>eS`5FEpz9F+7 z^Ye5;fCn81g0gxb}3!Ky9A+{30(g^&@t_p@cXs4Lw?9=uh-_5__QYLA%}(QpYqs zz;7>DN?}$n8==~YhCLzQBZ9^&O68Bf)F1)I#$NiW%I7kQ=YhF8$Z^&wVK1I6&b-k-(qL)J$%>!{P?}&X%g)KL^fy71}@k zhKj{cw)#I2zP0+Y#sxH*oja3~a18g$(pz@oW$jp<80%xN!Qo?_Y;UO7?-Ix|jIS|L zLGTe`t*WwqT}_KjnbV^|uT6TUI$gwHt;PSLb|*MdtEi>i{`RdY{=_OOLPZk7(ntnf z7={o3vsSb1_Bb|vkI~e0a>qob zGcn7vRl>xU4ek|S&b^QCJ6N6v`Ykg_`Hjwe+O;>v=Dy;VHb$$=Dn6=VdNGbx9d-X)490S9A{_{33m%a<9HG2*s=zTK z@5`-91m_F54i#fi25>c226rEm6jv0FZ?LbcjN2I+E^=A>0+);E}*4#Qjbf();8$QIcW{Od8EZtVzR|BJ4$ zMsx?p6Y++=*RcL%pQmS*r}yT&Od(8q?kXBB87@FXEJN7I8?4 z#m4`_X3`dlb5Kc6#P>d)onjx$l6p()9!fgmiayZ>+zdx7-2< z{N`7=+O4nS=%VH7ee7F0tXIL6lx!J?;dzbBgn>%g`QJSQBRlcb-0VnRr>1x`6VZo} z;6-=-4x*1ZLnHHBk{-n)Z6B{lnf-T9E0Wo7m1S@QAUt@c^9B7F3@6Mf5RySBiGx~g zJkbj?(ZnCkl6X|HguY#MV;oQ3zTS;Rng@mPJ&U?HBGcM_ek&b!kI%ym4bK&^)B$@nvD|RH0cg{ zZK=6}x0EpAfa#B!N}fE<`>39*V4|7Nm<7F4GaH@v>%|NCL2jrq&c9P5q1 z`#B&;514c-0aaICRPLITIYeI0*6jI3)%@UFse)E&EVal(axclt$0PKWQfVi^j_sL;WuDhZSr#UX>5p+Jr8)u5y^?@yfpx}j&mijv6)sBx%$N8Qs3SR37ppBOI0~B8ynNKqk|+~5H=?mxvxcc!V{Tj1kZb^ zH{W%QKXQn>)P?{)ucsxMEaVqXj2GU>9-K8jCBvqvC1o$@AbHwZMZsi ztOdVzKd_Jbz>6zZpYWhK?1eT$M#EBoasK@3#0Lf_j@;{dG2b(jO^DA@cM_dCSIPV8 z`0C-vM=KF^Wr=a8xF2n^oTs^FMw*k>bk@XP#|O3IsQTU8%lX~9W|EZzqLtYU@7rTj z!z^g#-NKU782_6W%`5X{w!v>UlRtYayzR0N83dcZf0{%q$VAW@T0y2+o>Q*aAg?AG zm0SI@Z;&>T;5-}5N5+xzih_{b0&0FiEI_Zf4;h2fE4O(uc=eH0KiKT@dID8Tv2wbq zu!s>$JoR0^)nSh|m^SXb;7LzW#AiR}N3ji4!2*D*0xFB1SgRz0)z}?-JroHPohBUL z_=gta=1~1m-^&PdXL}MAuk&Aff8(*FRBwo365v zK0^Dm)bc8cU4s3ejs|0KI*HTrO#UaKZT{=n8B~+--stjkyMMe<%TqJX?!McF-t4DM z2aCV#_9t?R2M2%W&;#@Wd`4rhZY6^6E?#%;5`*78Z2f&WEO6;Q=#+rpL)1D2N~YJ> z{?q0DlLhCOSGRS#uM;G)JA)S`o|mDW!8hakHWDF$!S1l4GBqCZZdJO#DXre7*< z+xL8cRx8D3`t9>issjGNc{uigh~2+T8&z|Xpb{4&oi4YH5kvqRMWVc^8C4ILa_}WU z4uxY2-VKGswoND4Bj6;`kg)d(e(%xZm5(zT>E%ra(W;xv4$V-YAxD@g2)jk9+aN2( z6|iknnnr2=Wcx$J1;n%Scx`5(aZ^q=%kg;-Q(A;K2f0S1wn*(H7b0T){zYk<{3X6q z5FA>%XDu$Rs2OrMtofSpS!pkRaqa1=z5AR&1K|1INgMj)c0NtOol}E?0DiZawDJaF zf|iqB0;MMw1AWWtdjg#w3Wj1VXtt=is{*ZSuPplo<6shRIT}G%=mo3)NdM{au>~_g z;&sJWKO|nPKR8J*7mt)5KDwWii1eU6a_3Ia5(#*nqdv~cLMw^b1EXpS5Y`|^DG$U|CyRQu zFB|xwIzpoQd*^{MLwfe~bsbiY#sJz`ZXkc7Txx`4$s%>4=kQ$A_Nn9<%yCwdw#DIk ztqu+D?7~&A9Kh>Y*;`t%So|S7fC?26M`RqaCpf2pT7J{mR`t&D91Hc7LZpfu+` zmwOiMfjt2n`BwWjAg04QjZx6SR8u6g?cMTxH=sZH$?0eaOx7ASPH~XxMAAG%eiT&V zKr%JL%f2$MP26sTm|;Pj0Fm0@0-g3%AIAY*O&35Q4V@?ru0o*ZY;LOSJY|k)_40K6 zqrYK>G5@N!K^kOLU}ovC<0*}AE8nrgY?XO^I_4^~^f;5vEQ z)#eA<&M4%Ee34HdkEDhV+EF#U`Q&XY0RVwbg_dF9I^|qxN4rmAr$H-Sfk{q}ERrk+ z0pH0oL4CW69`IdQm-Q{nhbAs--6eYiW(;!3OnwaxyNx4uM`4{+)>Bw45OF6C*@(CP z#%+=EddTAUYQ*yhS%2NC2jwhPJH(h;zlhDSvI~zGz&RjpzcNcv-kz2yw2($rN*JG11hw#BMooTfwzmZdao(z|^<${cp%fs&^BhVd5lSPPXaZ(??ivM2k(~S_yuXRPh7S zhb5{H9+*|mF1+qT55AGm8!v(5rJg(_a!)oCgPFRwE|7%X!A0{i&q~Ovd&&SR{{yT? zs@e`(f;tmx@C1Q%HjZFuHWzpHjok?<8cMo|?7slGu?F4gvwy6cXk0iQ9>XL50CcU}I z8Gn3W`W9I|J|>0ZdK8KxKSJwtj_${UTc|fuiL@z69fzBaztfBp%H)L<{NlmKe*l-7 zXi%&Klo43@;$-(E7WQ1J|NIdbD0uk;?0?DnZjXA6b`N3HM@64tU>vt;`8E;U&w-lm z6NNxBV~o*hDg+3AL~6yIe4Cd~f`s>hJ8s7J6i)_=?evcVhK^_GUkcp2xCDaY!h9&5 zmzBsrEQSlbyTupR$G#2eaMJf{=couhhJ=soaLppC0Ca6kPU;tATcMt2r4WL2+~a=lL`D0#$-SQc5r(_~yTso@A`r7@Obx*$ z?JO0o^+jJ)eg>J8F+>ho3F8~m;0U?lzB%ygWjE7*BUO*|(VF=i0ul#RqQ*~u6GP~L z8ba#X?z{q1Z3B%ymsTRAE=Bn(!fmR9+IuAfD*d z0^ojA=KY)MbId2AyMxW6G}`ljM?0ILR#4Ha2$IA!=_Crv0m%^-!?z35#`SN`Pw$c! z1A8QPn&y%2zZ7^EdOqa1DWHhypXhfR zt|9E}KlJI6sdFRmmP&x4W+xV|TZ4YMgYx-{$IO)N`dYxS09@o#w`gHD4T>WB?aibw zdO2jR^L56nXd?o8@!ENn?pCS2tde>KEg9(NB1~=31#jCVnz}7!!Q!|-6SavKuj%P?>LF^fydM+ zvq(Flu9^tKA=bEXLmUDI;HJE6;hO1&l_rK9e({YRUXyA}ycgHgfKumBR|ON9HGk~# zD8>f?hwb^Evdt_r>ghcm1i#d0Q?|)iYE(iey2zGbv@a2zS!OTNWVEY=b6yDq>nGTU zk~*0|?$7@Kabl0;S#tYK?mwve*PNAApJ^*e+JQ?&S)SlF$PiR9xY(w&s@i&WjLb4v!L+)NJldJJw4(nRY= z64xj^{y1Xg`+dh^oN=R0^R6HdAp_ZC zx=87hb49z=6{l>Of~qhO>{ax4>ZA3CZ}Uds`}Q%PW;xZgDZumve-ndoc^pFZyZg$E z0R)pX_y|HQ%D)$6tHGW}`oemVpMD$Kx9ICJgl`UHrI5%HhYhnk?cVZ0JC^dk)@$>I zt2zM-zO`7<#uUc*kv#9QU1ej5f-p=!)(b83wOi3|sL%Tt&JClJX)h>-R0wlNFjPqC zm@?VkBhQVPDX16lzn&MDRzxJ^N}9rs%ok^QVn99VH=Lmd4~VJhKKt$awIrFkXUubB-suj6mS> zPu-^pP1J)*+nN=3rH@M1)`Sf`YZ`m-{EGZe&b`*6q5Oarj5NOctvh|QY zy?anN^ky-OK$WqTgR6T=|G~twi?{`Cl9;(kyis^$HMV^e$h*M2j=8VXuPR6X(YX76 z0HHu$zdh_=#3A`R;lZg5B}h<~VjqZ*gD#Gc6MIX*a=A{0^-0xt=R;4O^M5xAl_M#~Tqf(W=75Xn-6t^iTwL+?x?Ad2IOE_0F(N1%m#(rpR<6At0* zNc=6FeJywDgslqLQKYW|C3G@7vIO8i&(2R&Z#qeU0MI~7F2D4)Vd@>z$^l;l^B848 zTts5*LmsKt(%bC+Itg9unZOv`!sSs0f8qnUK)#FEd?E-u_ZQkn7}2f;;XICo{+!X# zphI&rAEC%cF{1tLL?{Mh9Fe$vz<)jW7s~W~3)%W%fuq1@=6bSrZG$VJhtu`NBXGI& zV|XV$vquMy!0{oFi}Xj}*&#STzP$W&dIWy>{dds5;Dg%8flYXn92cBVV5uP_tFtizt{WNO?CD>XNnb&$*h4 zb+M=2rhW4KFj-w*{gSC!cFT(uCCd8=$x%Z7g3&Kmu}Nns)K_(rCK^*Hsjp)Nud+Z zp$A+TLn@F)2zUW>nUR**xePZXfW#5@C#Num0>=sT<+>Wgp(hPasrD&SRl{)~Oc>#S z9hY}JNVo$nb@j!RY&L&Jd=H8^Q{>L+0$akJP%y5qsTyCB7|k?4aFOOjm^o|Yik-U_ z`PSYt;|EHxvT-~}ekN$)?aeKWT+N041VzD|Xel98*wGzb?BSTnPG*1;#H7l>BM@d~ zI#&y$2*De|ye42W$J}~=w5!Q{mbw(Fz?UcqohkB%To8VmB44`A0usOD+FY@dm%*H^ zC0w6Kg&Ke_!kBqMh1w?^PhWA^F9!;eyjvyJ@hug+1@JgiHzpjA+0Lzsn#!Q4dEP!q z2xWtzf=fqiD4bTO?=EFGlPAgUty~KEZV(e8WWfwBL4-))EfDaD7X&x+5b#s>)YfFf z@LHAm@jN6{E&JkPcQ(O@W9Ea1A*245XYarK+ zbZRF`fU7w!S{TxUjD%|$EwMk!<6xw&=Sl66YI<-n(Qy?Sk#*3Pswy@arENi5{;z*U zX#79_^H_#Erz)|HgN_?Gq~ip>gTk0}B%CI!N$gMPM;|${2E#DPx37tUok#r8E%ql` zJVo;L;Q<#{m;5KojFII+>8L)B0t!#ftO%T)g2(3{&Q1?$%d`cg?FiY@*jpaRa~HIS zX`v%v_XY<5e0Y0&`T7Xxx+z6ex>?JH5mDon!=40wjPByL1H&}gNHC8Hc9TW@%MWLC zjI-`?E^~oa``(h)`vQB2%lu>)oNXbUOStF6fu67t69lve-UW>C1kA~eNM=k{kBW!K z$XPlbs%ltLKv92J%;;3y(6`w0D7Qs({|QyE&qkTc6sGR6J1wCWnK5;%#;19sm#Mj$9P24$jCDSTAAfK+b>BPkB zFA~Ejo`)Lu>vaxS#axf%vQE>$8-a>D1aoxf9pxz&03;1X)0j_C6>ZiC7Slfy{D7HB z^M!u;LX8q?Fx_G@XObFCZ6c`4*kz%qS_C6lS3F!B}`e> zot6kWh^I%%uVm#w`vr_K@?6Q(ys;vLBfl}8={3dC%WYE+IWcm<7ul0+B%W|Gc^%Wh zbBV+#;=ZIbD#cyJIe<}qBup!Y33{iN4BlWA7Y?8)bQ;r0akp52?Ud$!wl%%?eUJqpBxPPd_-|7Awre_hpwJY;0i+ zZl~Cp^6g&iF`q;FCc7Bm7wCBvS1=G&U_a;bdfO)ZtFKB-Ovw%aL%qt zsEU35LRXJpm{01<3+Q~>CAo}tbb%TtMl-rp?OaknuoW?iYfR7O8 zJJ}ZqOd{x@@!a#44@5nqoz;3?&=>jjvaIQqT0-{8v)eP0yQH;)-;G7LYEHW{b z+%G;KkMSKxFLfIqI!rPhkv-8-f-=!UVkenvf+PgE5Luvx-cZFWz9t*Xmv|O>=<%BX zx+Ca8-$Bvg6F`4H6F;9wcl6o$6Ywr@(K!zTm5Mz1nhyw4P6bq)3#dF9AR2HU1q<5f zil9=i0A_H>+&t*lIgYp}tcXi099Gzntc{K=R5wYWTG1M>EEuI!;s_@)3)N*AKB5^H ztXwp#Gbt!o+Clj^GrmD3ci^ugI38ms7quY;Map4es8AIph2{>n3;&cu@@#2DyL-K|PK7=pe40}uI zAXZT10^o26#x(t2LBX@3cHli;sTwNOLxwpR3ZI=@N@0R1KFXD) z@|LzE4xGSiE8i~XA;Y1ZA^JksM_-=se=q4DS10Gf0Q_)z{zV1nODXzEEUH3y>jOwv zW@)sh?}7=6Q;o#}cPJ};xOl_9GX0irwJELV1RpW%xh5qJ=2SPaU|`nN+^UuDm1h(g zYc<>ZXTfLbUK{(;&W`Sv6!jN6V&dd0a>cSt8HPkRV?Q|{#(meyS`GUoM$iSpSgD7W z{t~h(*l4ur2uFN~;Q;&`j3v}f}r&8zrf? zGqwOxdurRA&t#L6VrJn9w1MeNlawA63|bLKM%B)GdzS4oR7)`aSrJ?UdCqSA*Z&+S zwN{$hqD&n-J1x4Mp)K%K8`?7JuD+oyy8x^T-z}G=^5oB!mUa@oST0LtE%$C|C!Gsc znA*qlIPkE4qxKyST~vi4W$q_n6vR`0o`#7hN&uq*W_n(jr1Lm;~VwM&4BPQix4_UhW%55 zlha@VGmrLSo2jXZo%Vo=llBq}Lqyl|6hHkfs!r=lqGwY`{!!GI9tKQCG81f&(3;M~ z$1)D$FhdTdF_^~y-Gu>3A|FNV$al3l5qfx>?^_|mG{Eoi8bN}cY}~Z0`#+-BXDVCC z;DE1lStpfOR$0ku$KvgdfIq?hT}9E@BN}vAC_J4&t#5pxxZ@?JbRdWhWr2uwMC&8D zZX#-Y8B0ky8EtXlTvmL<7pezBMBtC7M;vH?mcF@ z!lm{yH7S++pWq))fzdWBO)p^L#{`CedYF|3Q_g_9dUKg)mo|7t6*dp>Wf9X1VwRX-!IGl$-#j#Ce9nUA>|bk z(;i-7dVdg+f#O6S^i{D!+kki=9aVFjdWwgg2c=5(!{syJB7SsZD?47HwrI=q8Y)fs zdM&*#;&Qc@QkcZ%*H~#NWj9@Fa1=j?X#MK7Mv}>ZvX_&D@2**IBm|bNI1*@nz%F;h zGz*%^@&eW!PtC%XSqcn6Qj8w~kja;G@;EuT0@Sd6DY(W#a0Es$TE%Hwb6L$X6cKb4 z!DlHw$@Z#`~Sd= zf~3)2GP`o^t+MlqgQV;h6*iWSC_9E8I{$d`MEv>c{0ZfVCjiaDczKGWCqm&pNvGTs zrmR@f6UuNbMnc(13K#0KY8*sPlDj5kiIHeql&=4TJ&&0_Y~AE9lN4)_a0Bq=9K};| z-1QUlRKx*SRy^V(@a8ilS8UnMc-g_~k&rK)|Dxnv2jlB_imo~MKfXK>Ma3}v zC%_Lfpv(wm0Z42km`;{ykoYIc$mf-)IQZg8Q+Zp&Bi%xtXdyy#b}|W|J4_f$Iv&Kc zC+R4Q0HowQooSghiL#?43!P9Ltny_rk2Ho-q2YsY89IUgZ+XcAb6I@JAo$W&vRFVs z<|B=VbNNK_VX_i%(-|s#@GO!%;yIGpG4o`u(6Q6Ve8d(Ff-F9pq9BA5abhAP2annL zoVS6RwNXmMILE7RQ&(mn40&c9GZbJJxG0%3sk471g73ue@o{xg^#2n`8#&=Qj!sIU z#wjH7ppizYAlwBHlcpVk3k2Oy5suM&YOtowXU8LxR4$T6*$S#@5J|TzD*J}u-_Q{l z4u>ys-j@)twF_rSeu#3)rTRP!eDHi2UczF6Fr=YUR;?3((KRI8#j{Oip*sx16Y*GgdMnsQJ4@fS%y6 z%u>)#l%!;6O2ZUJ)VPXo5%K}_)bkbx3Uf5!jf5dseJ+j;R|ld}65L#Zrew9rm9(Th zubny^xWs!jLoS{(S8IzW`)Q?G7lL>ejtO{tar{;rLFb0DS90R%P)>A#GzpXBoGB4g z2Bokh*%A}FlYM8xfLENAkZjNH690zy$7ihekG#jefH8tG9rcMwL?im+2@|XilzELv zx|4~2<6>jR&;ijJF$C$<5V;7!BVh0e@=dVD0!CgiAsh0>0!AGQzUPhy<_<2a(JTzu zXE0VG#4$_jJ>2yU0Y*k%0u^sn}YEPJ$Vtf4BC0zCx6(+0aog zZ4v@0-P``6L=R!##S84R{EL{}$XifY1|$+g-$CsIP9xhIl4(SV$YIIiFjzWD)xkjD zvX|->M=P_((PH2Ez64ugKY9e-M}TdL0S}W{x#oec(dS{I7Ugxa$rMk~CI7oY{pL%| ze`R*?oGF5#Cf;c*a8>mBJ1Rl={u1qQC-6xeLCg~1H!^s5I!EkJG_>HMB^^izp7<>7 zksr9I^T=lxZSupUhX?f6W#(w9BB2O?V|FHHsnEo8RX0wgSBErNn+APXgMN%P`R4FI z{#8O`9E5=vOqQ1+W$KeHDV1l%*%5JmPFz-?5mtkib_O*ntEwkSTGko7ySzcSN8rD( zAEOD1{=wKo0=}kF{l9o3QvT(3iu?~gfiWgyw%L^X<Y0Vf!yGRsWGo?G>|5hyzcY z+afy{Glr9mPl}iIK~hOBS2SJA9eWrOlmv4L3m^G$g!$VJik%LR(WJcjGM+^4EqNz*BAs_}3fdx)Y=2zdg?+?mqK-(nxr;cd&12RBHf9%MTd zu({9M%6oAfcwTVJlJ`CW9u*f)0CfL7Cow-90txUDmFX~AK4Fa)+0gk?H1d{U6tUwJ za2%ru{E+tX59~HYHX__Wa>Dr$uykFY2_N)~U5z<-iCMlYK8i|FBUjMY-(tZ8GFc~` zF5+se^AEXnLo8bO<@txB9LyNrAQoRtxr1qGxkW@`azOu^#0j#ZGXEk!`pN&!rVTs* z@Fe2Tl`7Fu4e z`eeDNF!jdpT{IW@F@`+sQ6%D(eok81WhQM1lPwxNOmI+xSNLQ@NXTsvxqOo+m`~)X z1G#oe9FHI=n?@JjV9&d}#j!J0c23b9yDq~OnV-q^+4;gsqD#xZ_VPIxgzTqHQIcxP z9?Yedt?0w-z=J$gJ|4>Rlw8Tl!D*iTQ|43Rk;~Gb9QuG@7dcS5fK2i8vNc-9!7G-4 zv{n4t!!f@kF^Ldl6pKaXBIA}zuK4?k3C;u&gIpLf@)xPsuy~~$D8vG%7m~P)@?y-k zSUocqA0?BRFY9>e7uZYA;uLrIOZW6P+7`*|>n%c`{;y3*5MTX(t!6WI?|gTm`Tjy- zhk^E2>!3tA2*F#T9@MM*xmafUnuiAR$oj8OZ74+7Q5p_gDl)%J%BUi5VKn#sVo#(( z3#WG@mN<{HA`kk@6}j70{K-zheaMNlxtoa#1^#}eMyB(WTE*S2%+5{kUzN@)x-!L- z_oQn|V}3%-g)!7z9PtD2O2DTVh>RO?0K$k@k{Jz&$YHtEdCS-hv5CV{)8IT2FdFa! zUl9X&0+cT;5e46AF9@x%RgvvSEaw0te+uJdV5#{)Er2QVvn0oKf(T^dMmiSl%>$)j z7|KN3d|t>y)Ku<-aGG50jw31+6Q)vJcMP|n>l8;k8Kr6#@n}|W$#c9*kpaO=94j{y zvkQD6yGcOY?HS<(j1joJd_@JvS_5i==${B-1ioPRIwJ6k6vi2n`297h*_S&&tIESPbwqmn zA+I6YYgKYK(HfID3b!Xm1#+pNq?xKFV=7ATw9pYS%&uuDZ_6kGnG8QNm#d&Q&0M3@ zqZD}b=w5QzFvJlWAA#NGu*p=Q{z!A$fNsyw`ST{K*|1xIf-F?`0JqG&>ULdv-HCdUPQ2fRl8Sk*7gtXXvO|#_OacjG43Ak7Y_G z7lp{DMjJ+iq7t{V1SF;!=vOZ-uq@otQgLWKfu-C~5P0(RU}Ar{BPT*GX-TGcvUggs zoMX@j2$H1`_l&XpAV%UW^@oc$m*PTdMJLcPIDJOBcOH4l*5U?L+OcZ|LrUm{a*r;h7ux8VE;fHG4cl)RONu@_8w5lQz27yyGc40K4b#%C?svM`wQcJ=px=M&rHB{3YASfr2vPm{LmH_f-La8NLed4osXWfJlYZ{xxxbbZ0A>{)x)FqJjR|Z z)E1~(pnaG}&-`Hmcdp7dU*^@Tffh~cdF)~*1}(nCXyp+f9wr_5J@zLNt)EZxq%&pO z;2X3gg|~lj54nPcZ6h8%1+DM>z(vb6+)#|-((Km4Xo1#= zJX6zB>useFt+ZXpkE3N6P(y<@>=uof-v$+%rj$&2O9g*gS}xy_MS&z*%_M|^S)B|| zSHZ|i1WT6mk2+@_3lUH()@FJ3)D|78T#_Sb13W9(3y%T%Rm_F_Oi;e(1Sh-St|hk{ zS{Z5unX3G4CmR@fa@JR(ZgQ-zC@im}tQuZk3d+{2tE=;z1W3iGkfN=U$(xlf8N$?Y zD@xDUBiZKUDkH6xgC|E1`Yw2!=TbJDhv0GP*eXnsle#5HzAuP^ipj*Joze$FB$gp& z-%1cu^E+dIFAQOACvv64w&q9=l5HDC0Vvby?0XBe!5_e4C2;jO}$p_6$*}~l7Ckw`N&!d0QIi{(i;yrU22q{48coldqiddmUEKVVLjh5Ag zTWbEqmVg!FMj`NNW7Wt1{sAo&WwMM(QMaV5R-4nfcUz1=-iWj{a$%PvULjqvNXiyv3X8%8#2#IJ zw3s5{R}*j?42dN1|M`C-|IcrMmZoV;pO&f@F5XIX3zgeSyST?D@#0({o^q0RbrLnu zO!@H0mBO71iBgI^(sqP?S<@-ueB@#0HCpmc`2)nkB|G*6{s5z%g?uNge<*5pCbkA@ z9w<~7x2kV8@KEia`+PRg|F!-8@>!$*yJoMK*Z;aDIxSXl4J&&y@ig}7dkC7v#ERo~H5@R-WV*__0u2!$s>xK#XMsY(;&Tbve( zOWYWl(QdEN@*OiwMEUg;rIjVSB&AKh7D15->Qv~_K9xUs59j5f`ZrZv>cDVm&VoOK z%)rzf3Pl@yb)5@Z3U!nN6H{QN8cO?kUEif~ts8cpqVK-C-rKgb8VG=7J_GCne0P$5 zCG~nTogO9K*iK#w+h2A;y5*o$2p-GNg$`{i9jVwRhifO9+FW++j0|7mS@df)aZS^{ z7ql_H*}Mhm0%>(8CDmo>Pj*0>!QwHfrZ}0xk{ua%TkX=KBou|j{G#)7g-G0+j`#7@ zu>bgZ-;NS`-MLN!)oU1o>-K-mLi~r-H~0I$5AyK%4{6k}O!F)nH5X_f_y=d=M3B@o z9e{nFfM}ZDtCHA91dJd-u8ipAw?GK#u}YG%y4opwmF_-sj#Nq|yN}XO(fK<#X4g6v zP7S2dup;U-&5EC%vImSp;qXWy%H3UglG_OYU*S_#@)^#&tbw<+=rnvhJBXr0(>8oeG90cPOM!j$K&rO|wRjCTC=DMFEZma*t5%XvsRddZeZ36n zYksD=1zHP*HbKGRs$O%8lR?H+C_S}un#ll&>~u@UkbV4^nmz0ARCHJlQ_j`f$_s}Q z1Qo7Lfwz^b;V^@ygg@A^pmqvfQtjL?t+?56$dHe^!y%6?l@5paSZ6q7y%oKg#k6iX z1cuJv!6}MSG?TgJ_&K-ib(sHue*R9hSMt%qk(&#Ob6KsX%s*M!bU4g$=faWEKkNCM z2lyx-7@1lzw&nUs8jh3gClT?YWjB$NPJJx)?P)0yNTMGq94a`LwUhrNmamp&WY|1win4PWp&|F5oFdHdhCx_kToAs!L`oihva z=dZ+(Z|oBkv5X}REO^x%rW2cQrYR?#*?Fxa(E9!NL^7ve&*;ata+d$kKaW-vjNt_Q z`DcscJfC~sdEjA(?`l=Sgh??LcwIa%m^mvbe!h%?c}RaFe{rNnor}|DtM!a5q^f!7 zy9qSYX6Y|}(wi05l+DOYVIhIVc{TMjht6#F72}k~5PP6?&h|2sRB#k=Cp~7aq{k>b z8CV&jB>rM4q*nGxE`a~$3HW}&{bz-?-;^|Xu|5n&oa>jEGUx3RK0TKqJewK{JlH35 z-k<04NE=s;nwDhe4;Td%P0~P1)0izq;Ods+88hmZ7AxiqS0*bu#+GU_ z+$ad*PMeTvhbPG3=aOYwT=6c~$TgECO)~lCpP5{hZ2H9kTcfJs1?KigMfT5s;IpCq zN1DU{uCf0NvuOY6R&Q_rJ;amPe=^6Uqa=ppqf8R(k7r$MX8jf1f!YIz@si_vwc@+V zcK3_XjDP;Aslq-DHLhGRuL<~iAHrYfXuX#^+a=UkW&47sq8VJ1tg&3OIP%tounFCb zF^U1G9gn=%KY#7Bq5KyY81F{@8&*;N_xJ1n2YC|tFSalq%iF`TKLHaQr)KS8&Itgp z&$DWa-KmfAn#PT^gSyf35E`Pfq0e>UQ60B@IqDsaY-`IQUOiy(;uikqxT?|4MRT?l$VL zOw-+S%wO6)D_2`3?vCs~%Qo}#->~-f--A4f{io(q9^*-KpRYvF zPS|7B1WrmTd4nolwyQEeG+6h_I&*e-kA-|* z^Ry5{eIS!|PomJte&k=6#f!xSTl5)Y5AmjU;#t^9zNfbmRoNm5iC%DnrB&p382L#W zWSMoMU7Cpq0OCY2L}JD(KJL;@Y^A`+sEBjh2t) z{-2Tyf_CfwDYJC$+5eMvPvaAx$;!O?tY=!JZnNcDKYz?K#gu7l`nvI9&%BFbC#OD> zrY!F3sAo>)-}`~jMhnlVLF7T&xu4!!ZO*r_r z^Xu*H#l}zl`M(JL&h;Yno8JJj&i>O2^WW%Od;iaaJXQAJ$Mbi8f$6sh{fyN|%ea^b zJ(;rs880qFlvU8^SI`PV<;DMfDH3 z;7=Odc)d@yPwXU{OLm>iX|HR(if2Rlztj95{a*h5H>=m(=l^?fNu{WsY2E^l${OtZDUIJG;hXwYJv#cP*vJ#rqFe&##S438Qbejb2-C z>m9>v9f0gTdHlXo-kB9lamVBF#Eqlm`s{pRWhvv;{{B0&xWt8`W?8>f40$pn%aJQ1Wq&A1GI@jwdJw z(!>{J_Xas{5P!3^KPX+4Ts}WPzBs;mf06MR{9o0jaCUxm{Ory1%j;*yC$FEsJI$2z z$8l@#UMjkmzDfVm>$5j+EfARYA`t1CpRbZzg{#@Vx=liT`_FXU6ceQ(EJu`n3ejF4#inVe( z(f`+YbecUi>_2wfL+AQc5aHjbHuug0_jn!$?9#g(-2Y`3^MBZScc1^`K^|fMVUp%P zWrx@afCNA=^5%$1DyDs>2@8NQZ~;u100iuo4+7#Ti~)=ga3Ta_rwNVu+h5c>)H9~tEkYpg0_X@b! zo|?hCa-j6R0@M{iD2}kB_VhSM=gIkp4>9)eZ!pGze~uyt`7xZJG(QB-fqWtKpI~*V z4%6HY;>Lz>p1k1|94}A=CrGKJq_@^l@q0GyMQKakqFE3vciEU3!?;O%YS2>8PN=W{ zn`Zq_~cJMm$uGhf~BlV1PB z!;GE4*IS_n9;d6W!{P>EPEAx22Yo+?nN+Svp;Eq_Or=1oX&chZ`#Ygo(n?>aWf@M1 zGK;Zl?YR%%{idJ#`d?l)+W7e28vSn=R!`5L|Lg7ZKRwLTSpT1iyJGJ}`zKe5?nw6w zd<`|fdL8c8dOv@+?pL7o)m|y;eD!M$jjs^+eHh^xjFy+;ir=HBV501R%bR~ol{6l; z=P~xu+v+%~+=l!2a2^M5uzz!pRS118YFNcO`2oo_zc4V_?<)qVgoNTal@zK`L!QYB zwaH78X}9L_u`2{?b}qYZFzI5E@?s(8Ob+qk;RbyExSTuH50YCz?k?y&7nL*7`iWFJ zPMHa`qB!el(a$-8L`T=1eTlRqmoXf9RgzNOs!pyBmoUOxDpAc`_co#}AR*+_tR<*# zfowXIjFdZ}Qao$E=TSXX_P+3)_BYB6RY(pCR&1ga@EvmBV%PQ1EsVJMZk3b9)2zJ6 z14tp8i~r6cW>a4vD%6>g=(I*2?ybBoA@pfx@9zm<)A^rlMisG;>t;Sek&j|T zoXBmZPQ(2EdQEZ?Qnsx)T_a`JOSxg3RgGYNSZ1XoGHW;(vwGt&TQvl;EqcGY{>qMT zP+hUla{{$w_?fhvWnLr_Yh8bpb8Hb;(ie18R!yQ66_T>b4h!wg`yR?8h)V@w3MND$ zcUlN@x58ziiu#9lSQIyi%iI(N=RqruAR6PFr0FSNwQw_f?;I4xt@6sgZ(kr5eAd1|3rros4D?a z?3+4zK%VeVmS1H?uvUZ!#j>Kr2<8`&7h!lu^NO-xb5uM{cS7Z>WF6uc=}{?CK-uri z`lW=X4CnGb4`tjF>vNV>zLfD*UQgsg?mLCPVmpYx|DMX$^9YUcU5g{9pUcn|C<9;w zog3u4N12!FiQv~5V0F7vKB?xD9bJG0fZb+Lcng3(pN&w&!P9H<3+>2QO*x9*t*@V? zjJ39^e3w;C!T(@icYXh_2u$Pw(~Z2q>-@hxGk^bISMTlf|31jW{J+mKUfy_$z&mxY zg|C;pdL8JihXH|b_42s?^&VcqMIl4HGe2*JHye6;GqAhy`4&;8^5rk}{1*GE=vOS3 zslV^b*Gw7a$*ji&ZtPFmHv_f|SQr&ct0Ea+>jLZB+6R`)lrV5Fk%yc(h>nU&2<2<8 zk(DKQ8FqmHr=^k#E$bE#&@&i2(>HYk_u52M{-z|3uUF-8%CwL&R%%WCo}_auDbY$c zrdZkZ3poP+Y6%}f>wj|2jtX381*+!~Q$19IENvA^N!=5WVlN$wg3L)){Co$CmE?by zFGkdIboLaki;4q~kw%0G;xSaXfIG6oQQ}aijlO>ot|F{MXp@Windk7x0 z%y6uG4hs$CiAD-wZDpqN93vG)p5KL(A(;F-%&S2<`1uhj;7NK?cKvE%RAas%PEtf` zu#^Ze!&Gn=yM7&cYDW}kR6f=vRK?ev+6`Do75255Mgb_YOW|XdQ3{?RpD5jy(_5fq z*{D?($}ITgpjFXYmz%2Kx8S3dJ=BPUR$|&U?-Y1RH5|mIrYOdK9IZARdX;8FO~oZ+ zFH|RMx$4T4)R^H_&|dWAUVrWN*Is|smOgv^wbx(Yvi^EV_4WH-k^-u}|2JGX8^r#8 zS0n$6(a)d%G3e*L|Mvl&#__-B@>GA!@BKOPAfDY%G;p|Z(%V2vJh$q#7h0MCVztw@ z!eyJs1uEUO**Tk;zTbxnr?CrrHx6Ebg(|kkinAzFvZb|hfsm5kq8C_xSy^SiAJWz& zF>^tb*%QvyT3#&0mim-S*)D(1sN9n*t5f?ah?2S^6hrKTGN)~|(^YArfEV4`nj&x3 zCew~Q^Qnogjw5h`P?qwy{Og`PqL3j+*YVyCYd|+1`_Vj_W+?JE`MqJL%oinJe%aE66^bz@(R(j*FyNO1&XEYh1ghiFfxJ5m>@ zYe3Q!mlixvpv?EqA~a7uFIt6!5tCKUQYAV0cB<9B;2b<>X2s94!I>|bZ;{AY@BFNd zLpK*K$UnOh^A%Rn??KP4uK(4#@U8R9mHVaoDZA3+iFtU&DHV4iofTbRB*EeQ z`7XiF?y3FMk^lT;)Pv{$q5l=~{|t8bKRwD*TmH+O8J|f3V8Bav{nR6Y_u26?j~3S2 z?c4jP96@0ryQG7WF zY~d$q>MaoMwFMz@>Nsl7DUmb9ME*L0{`W9|p@));20AQ3Fzu{DOtGL2nH|C)i0;}v z{eK(Bb#9paaw^-swkbvb?MDgUra%hmzd=U27Mj}kG@Eu0lB?$del6EC0r z)OP8NLLWb>x1p-%O)}D6d>|+ZVZfa&3Mp(|iBjw}QcCJcBa{!I8n*Mx)|Qf%Y388I z=%+xbDEmQwrx9-}Zd(+#^4Dww`3i<}nd`*$RjU7TPHlx&>wHy7$GDmy$LuD7vl;gC zo09Tz);?JW+)}v=XUaqSPG>V5Vj?OSFZKO)TZM9rp2|JuB!%$#SW;dN* zrh3nwU#j+Cb*oi9;kKFvI9*&sY_&@Avl4nZ3KLIyqmwUFz z<-A1Rcnh&+))OlP4M$!wznDpq-P9G9((xKMmN$Yr~Hr8Ggl z%8@xDqihR;N1%tuDNhevpQ!*m5M0W6P&X|^m1yT1`~yC<{eO_}tk!V@ZrT6qjr*qmZ_wYxe?87q%m1hE+<%rxFnyMN z9Wh~P-Rr;fAcTk7ODw?rTJ{uOcY>w&xf0BD>&b8thkSpa%fGBDl#0LN`GA_NYhu zUIY*0=M0KVNK=E&`LuUJg1SK=*p_F@^RtW>b0@o)_~6ULwp|{?7=9p!F2A8o+McDGmFh^#zZ@{#!ov_`jApyRrb- z#{UO{iOK(m-Ch32M|t={4ua?o{B<=&Lj3|H0#gJcuC4hf?368JYd-bc9GWT*q${Fx zrdCo=cO(gtSt)>wZEKSsT_LhcL^{eiPNF!$)Sk(;N@m2E7Z}xTn3^a)Zx=U`TDAm- zE&YgYik54XoJGr+CH4PHuhTnjS$870_iIN#&nt+SA_6t6wiE-r%gz?ayUn^JB^=+T zcBkamh_uaZ;zkMh56ZhzDA~!%b|1=4denI8@qgjutr-HgjsFjOX8zxPzqgD3ew0Vm z|3%a;(r2K>UobW zxBqXywf0~f8?i8J4wq|{?153 zq4}0Apq_#KEJVWc*>1QW)#d;L9hY8u3&&?m~zxOW@FOX`w4OAtURGO==h{yiafYV z5lEvYVm2ISe0(Hl7zKXHHfI97#02@&v?B|gg8k`+jq>x0Yg!hEbLPo9=)J9wJ0+u+_pnw*`477@ltHeJkX3Q zfGf_rLJ?!;$p&tpeLQwYRyXT8@wE$zKz^G|Ltt5~M_Z3K$Yub?qsve;F(#+PUZ#LR zuaw{S#x91`VLS;7kV?|(Wh;?atF|72SdYp?r;Jf3g>;g$$u3q7FU2&O?Oal5yN1U= zX{*9|#NWBrnV>j;9s;fZY=PGMR((bz8)mY2V@H=nw1L|jV>^Vc&1d^gXoqhQYh$?m z#J935d*A{b>U*+9$D=M4AC+QQ{;flzFwo+U{eAK znymr`*arDp6tKZoi_ahqz`k5i7ZCvvtYLtCVB*~WHa%#$D6(;Ar^u#5+v3ymKS8U* z{-327Xo1W{_2PMip@DfhjN6fE25am;C>9_ORJ>2=MkT(_FuMA4&Mu9fG(P9 zhTxX-pS|v&Z`gmsZg;%1{~qI^3;*ytaI-*Q32_Lr!7beIrO2`G4l|}<*&oQ6Dus9^ z0dhvu2HTxEg$ORZlxY?%b=b$;lcZO=Tm^x0+#uTkr{6kp_7T|Q6(|NM;{(JGEeGf= z4*m0#O0oop^H%Ph({4d^gt~7zqfjBXoaZWkmxUQ8@HCl=B<12Q;SoUM;H{0ky4(8j*SXzCudfWD|KPiHMU+rH2~pbtbI zbJAWmj#IPX3-Ani8&6&%n*Dr890Vmx9P%VoOO&Q`VMDSI{hELLG5>Z_82tJu6xLut zl5-UonmqtexR%*yIp4c{d;VOke&%>TDW-fi2C_q|h+fk!m6aghUcb0{|L{;B9^#Lu z*MF@ElhxS@^!@dVn}-H``KoFMuqz6*_0^fBEQ?wh{8v|R-dkI`ygP;hliN8ac_83r`1P1|D<`kJ zo#(om`uw=OSy7OSe!6aIySv>R&==Mc@aSOpd2*yKO=8G7hNkOnnH|0Y=7z>6eLy+RE|LM$V z2UG6ZVr38>8#_Lm^XzZk&@KVS8o{dFE94R$Ergj?oz=+tcAqRXyx1U_tb#?nk|y7* zC1!oaj7pzLtPr+}hlPZ&ucur-p)Y zPr7~QwpH0Sv*-|q#O@1sPW3qKhi8RltqKN8#XJ41x4BWZqv|gkbMN7UC{gVHes)c5 z`TPt~A)>~d=6SzMiOe2_WonpK)2LzwDsp<$Fv`|(g7-nCVs-hvfairEy`~P~s((*v zQ5ZcqalXVOj(uWTUZp;`&{-Woz^54M(~u6^5@78Kp^oOp`D=)e*P_H<$nrJZy>t^V zFpc=MnqCx5603`u|Dy%^;RNi>Js>Jmr4~ZB)b_$In4d@Of_{uQmt+%p-fT^%kJ-Bp zzayLcM}2&QfOibdIQvWRS=0P7YadAneIUYfKqUfSwscoTvt{bG;TBwf;>bDdWj{U% zJ+#G1X``W!$6z(*9b%5;v}n;*Yd(xOk|z@Jp>_g}j(TSv6>%w@41-ySwtQ&4D?HFC zj1KN~K3IMSyS4{h#L65!*FoBOSDr!S`@4|s?kq$&=L1)d&$N7Kis0Uy?n;auzT2Fz zehz?H6>lOv<@vMfp~jIU1QLOs>&7n1;p!4*#%7*hgWNGzpva zJoT5iQ@r0D)WIcNW~?pZyA`k$CL3LQ`WZ+(>u);CGs&~)LW~13q$lnNxt><7M7e(V z>PRiGlQ^jFg#WQ)bxusoW77xsDH7Rc6a{fFM_@hfhwY(!p^JP@=-9*O(f3LenOMf@ zA2M{R$m?!-d5vnA$oEoA{!6Li?X<3k_qjo_85MU7~oJ7a%Na#WbEGf!g69#5^$~nggzI{F(Nk ze^4@&3A?$YfW4Y$TN$GS`>#3(Zo&smSlU*ekU|r|;QE8U_X%MDJE_V#FJjmvQ-QsZ zys8eY47d7uHo4=z7o49~HhI-~@QZwx+hp9{ap+wU%83Z{<05J@j*8(KTpzFR`qTwZ-OjgOq7T?~CKvE8-wkw(`U1_EJ8eNmYgf3bs zF`4r)k_nvJ&(8sP<^<0t2J-ji5PvZ)wXp^!z+de8Q)CfErep0sf;hm8rkN;4;_^G- zZa*07L;fdK#UikM#Czm3q$$wUFO^_EwqMKi>xVkTx9KP%OK6S`gmdE%F!ePs&zei0Lq6v#gb!f~fJ$*OcpERfcQo(l5nT>24UqCsBBlg;Mfvo3O9?sMiiJ zTF(go0^j>r|A{0!gl(7jYkit=5z&<5yWW_0|7n5z!FRP*YjuiwH5Os@>t9>HIvvHB zNg4X!Jr{>HMy7mjLJK+K~LLvwkQk+B;u4Igpkd}?KH5F=?Lxj?pa4R`!fjUcTR8n!hP!a zx{=11qsUZfYEjZ*z_;P_5d$YQIH7WW) zLK@04;%PBH#V~U4!5c{e;XT|nIiT+Ofcgg;C-||>ZpItcxeput&qr8%*1Ba$C-29O z2a{yKpBW>=41Yw*`eYHj5S~?GRVkF6yHpY3uo`epuMG3k9H1**IEct|jNa~nz(F?> zvT?G{6>O|E;vo(4-U!tTNtTjhPk6J&o+m7+33UnMTfvXG`6n{_)X0I=R4hEew4hxA z;b+%zx#1fI&&KdHB|olo+4+jw8*2E~U6+8o!GAf^X-xd^HtX%x&lkKrxIY`ea-}zB zYDG1JnX#p)%a9n>4&*OI7Rn7oDsUV<-bb|YVNwTK6T33*&M1DcvawRX$ zTA+rt*$&iS`*p6fNJSqsc)=*dvW$~~-E-u$8#K>y_c290K%c||r= zr;%>Sd2|==wO|wmWa8gi_wdaUke)Zt?`vHF1&`&Y1Kpx)tDv|WCxDz--FXrxR^o${ z>$!H@k|$297frR2JN+Y>vb9NzkJ({NJ=Oe$>_kcv3k#?t!q`oQ@nOin{L4QG?-Jva z(kixRaw}W!wNBaDPT$`JuL18bTZJDD~4e?UdqajWybG_WyX>pyl8@CdO(^Y{g z!?dDp29a-zh#`?wGx3w$7azLCPHQxNVyGUyt80E{Ee~=(etHbc>2NZHd{~+{W z4iWQeQ@G{~57rL)j)$s%ufBtCmPNw|N9!3;i0hnK4XQ)oTH5DQPG7SY9E$W&dK6_E z2asO!Y@fB};Mz_=Z(DtT009zok7H4?L$lYUE6-%bF$|~E5SUu(fFpNDyvL-_Ny0ZYgE>6MLsVhIn>9OBDO)nWccs>a z=|A`6WGnvFdp(m#pq}h)I!Ie&2Pgeq^$*wjP~(0UAo%Kr33vBa?oW=SyUuzfT$-E9 zW03!hsdW{UVD@{LUxQ+7<3m>fxJ0H=H*g>;Ns2wYshj4@jIUvY1il4#$jk2w27;F4 z(BX99UocC#t&2lxllm|>w=#{!>wI(GrF3${!*9NV^6yUqSHHV^)XQ${>x0+C@GgYd zdy~oEmusTV zPw=-goNLb*9o=DOuA5(sMVV9`nEPqW@ZKZ&_A&JDW;b}{G&C}`U+&N%ItP8Fhh;GFhvMuEsy0X@ctY@)Qb`5H9Wz;*LQz=GNq(rxhIT7B zOG19()k<53m8c$TUiYdO(N3Wc5g$8fyDdjF;8~iZ$By__?hk3VZ36{5j>>`zsL1Qk zAOk{LwD8M&G=@{13C08(VAgvgR_EPTE8@iJdUVWJhKaRXW-F%+Gv-3sqT=>Y&$_Q; z76!<*R6CzZox z9JZB9YN&L~=8MlMbV%D*9dXEkr^Pq^1FubvJH0>nk~?4X6xSIP*_UhR<;TVZrdD0o ziE*YhW>cL~$Hi5b=-G(|OawA1MbOZgH$QZCQcPv`=IHfs&bc7fJYku@Ws(U zh(k^p#Tmk>MGx)uqoGJdKN9m!rimeLANnoqg_Oou>eK@d8+=yLG(={ZynhR&Zg(e# zsaP4z)@2`itHW6BLOj7P6RCC2zvrv&=8v~~f!)cLR2Lmufdfok0!So}!FSR8q;r~4 z)s(n48&|kJn7w!f0j8xYUdQiSCb?fsfcvAr&&Oh{KAaI$bFpTbThb9%Xa_oV7b!O2 zPm!+44o)vG57c3u(!OyAK(NB{y9;BG zFQm`LWZjxUc7g8IUGpP*ZFu3%e8`|_3dnDe5W-BdSfc{K6#Q3~0{ugzxJl1l(TCOV zynK1aQU@I33}_K&mnsu4z2pEuCuq^7jAVZYsDG`y17=Md?*QR(i(P<&?kgIFoau?I zA_YJEdQjpmEOrH1>FwUK_IVRSu&`!>UI<1(`sj7T+Zb%+Mpp{Ww;g#($aG>yKNXTHo{>KZdnECA*^wYcv~w3L&{auxxkL&B$Hdo>_E=GbZ^{t*|i zpYkiStzbG+|0fPLwB>TN>Lvxa8S|#ZpmJ_X;+=d>fc<(V#jan|Y?epr$Yv#&`o7SL zgd*sNkxBgFGIic(g`E58;aZ#y+ZBD2v-v-e{S0pMae$X`2=rbSI)Z`xxZ()d-+yz0 zh_Y~2O#*aiD_{^E!8C*)prvpQVvo z5U0#A@tv&4-pzg|q&ca2fD^+8xT+xtyX$SkFxbJq@|^k3+18&F_g4>swC3QxRv>!% zNINdOdf41o#}qwEEwJCy=PC*T*dV=Tb#^a6X!j;$x=6?*4`59~pL_$6{M-br6PV*J z0L|h4ZZHTfpY;&Hp8ID82Enc90C|BwvL>b^ijc~n!gJ~U<2zv0pmP{FwqJp+g{%Jh zAyQW<@-JRNWx7@y%7Z~lc7Qa#DWU}6k%=@d*C=5UWR6vgPERZTVny%%45wY_z`1Ky zzx=~qVQYH>7&lPEcfz&KsW1FgUOFWJ|K}~+&78|t;B2ACCZMRX=`z>TXsQE^dgDXZ zgyGW;!Np|<>tw-MOaE?@k7w)cZ60Aa%?^S$9x_D6Le$2 zzhK^ZNH4bDx}dPA-BU1Lv#1P#?IOt8S+y<|xF!y_hPD&nRruBnmVC=ujy&LRz``on z2yf^%y@*R>YLGt%V~)Lnk3odw<~E?$i(VWPqJOMMGIno0Z#KQl$GPC%M0lrn0QnQG zql~Ql~Bg{$$PW)BC!=!NhG* z5y(FK{&mW(d;W-7^bz%H z*8B0NguBB(?V9k{9j8@{b)@ExRB6L%@T)2nuaZKz552hk{kuNSXM(kEuhWljdGa3i z(5!FFrVRRO9=z?XySe>Y_Am%r$P8XhbdPEiqZ2x&>m2dELQBxbf z=(>N|`qkT?Zi{VZrIU8>j^w)uD{gixj(ddC>tvcG$Sx)?Cs64e6fC4~Tx4)J?t6X(r5a z6%#7L)rVZxQPh)f%xeUbh)UqsSlW=ARoNu!f)>lj?!UqEltxXjHH8OIEa%*2_R2;| zapc;6FfE3}_?2a5Z{o-`#zL`I1)9iOx@&~$Oup!6#Qj)UkGr#s$}rKZ)d~`c zXV!FUVb?4lwZDnRm~6HWRDn=38Rkn?3}m{&L^ktSuX=6ITYXNW;+#BunO;8TkR5Bf zHK?<<*cMc*Ns=}pqc8QZdxw@$)l|Jak#3*tFUS`4HIgrSf9k?EGV#O5WOt_@>DmIj zgzk4DpYxlxrao!ZZx>E#UjMAIaJSYgm{yL=b*iQN9Af%VEmRr6mt2b$lc7ON=RLW% zKrcqCPJ%e=d#5`d{D4ug^ln&Pb4d84aRFfq-!S!;ly8@nzR6?j#l)33{`N;UmjYb_ zuO}0aRPAM_N$oGrNaK69Rlk-htD6&B9^xnd&f`pP`*#|?VDOqW zkVaw$j=`EvQx7&lZ1XH%9yVbWKFwB=IyY(NLA;I zCormlKPrD5y#Gj{rTH3x(kE~%t!BINRNAge&#u~!9bvL4Hq3N4ARVEL~s#X$>J>%O{FrsG##Ai5XQ^#2ncpai% zY`aO0pg3wOtuGvBcJUCL5%RU(%b&}NC$2qU49AVHe+c-iQbY0zEn|f5OJ>2ToCTG-T?mW zfGVi#4iFk|3W5IScM7EZbdvRwKze1|BC&v@52dw`CO!?R!fZ0n(*l#Z*aNcGNM-&!J zKS`ZBN-cMAzUDNQ>0OBwmeCxX;j?H_gv(pYABhB<3@Rq=jA7TI7D7SHv$LQ#m=J+# zc~?~WPn3O~Q|`F~CA8_(2RJsC-odPn0AV4oy{~UKQ@|a)>f1k6ZmqLSRTL+@ zz6D%&8oC(SiGv0mDmN4~VM|PSZ8ZA+d{aZYl)&1WBUp8@ahGTp;Sav#P!`#gdsQaRl9+CRWQ&vAEUfmZmY8oX5AjDCAa$+~51@0V(5f@QGJOYJ#rhyZM9CgK zzyLe+1dHCQC&G6X-sy6MPkSx1a}z-pnF95!HnAH781m_hHoaJ*S4`O_Hh~B26jA z0!GpwR~tuaV6@%hNCB>Ce_tqFT!hK$d=ji9`24#42Ke4G823SJeCN#V56kAOqVA$} z>2??$iLXEI9&0{|`Xl@;z;?z(>Al zupqjkPr^o09u8QfwFJksZ1?MMidp90m}nL)cug`HE^=jk7;izJl`*%g(w4PS;SB$G z>)wGdMm9H}r)9kefG{R37Rr9I_d)2`2-an3SFB$)x&R1x@A>r%U-xQi`iuQLFdk8w zfHarM)q9W_gfLpw&pkapr(wL;yDC{q@z@$^<9Tsg?dX`lS8-uFiT?B8#lO!9f+EK& z7l_F?#Un9l2G(x*SAquMYS;i~X)#hP-!&N7K_;w%U?=qiw_jDyYrdX3zrLXR${0S# zt3}SP4V|yWBGj>lEc+p~+!s@!Cx4tdxZa2gj-i_lSUFM48a9$^R0`{}j75?3hI#B~ z!SJ))*oj|LXoZgDd{=DqOJ+>JIod2p?2L6UCH=eW(HE7fIsO$Y;GuzfHU*1y zip1K+-=c6^Ou@NMA$QZ?Q_OnRjp)B;B{GQX{RV3rQRPRANPf*nHw` zcj&Y>wFoJmiOx*VziQ*4M-&2ywX~N)%J_WiZa6R)FAyD?03Tsj0K`XjdEX1YB4zyO zP{B{}EEa5P0ZQ}NYrK|#4n*wX1q|iYQ110Mn7Xap;A9mzp+PcB9b0a6^>uF3rt)@B zju#RR7T2#SjlboN$zb94M~9tFsVN^VS3~w%bPsw|JVlMZ!?uNMxS);|mSAU6xkMz= z9G%iUS31MYMYXmrvYZGc25Efa&zQP>DBdBDXM(&6xjln|mife74@5VfdoOJ`*e(EZ zC@OPDkGT)9>V>0^BJ+0s(z`U=U{OQymAXh-)`}Ts&?_0O8@*P}VUo2xFm+}4hGvCm zD6ynoUR4We5G#wu`}(f=Yys-Q^+n+Ws|F^L5*D7RUrkrz(F;D0o!jP>D(({CWONNE z%XGfw$$BX~^qzlM89epp`1B)dOV=sZe)hQ*u}cH}!VTf=$_z#lljif})wa@LMJGhp znIxYE4fXvOnpwu$#&`8rZ%?lwujDeDvrcUgC>?ty8hd)5dJ2jPW_I~ZWA5;3I%T43 zbcg6!BZT+wS}=Zq+l3+q{-i(}=N~;Rl!mV?JL&m+l#GR2eC)?1!jZG$+Wm8{MDk3x z*743$8%$dfyGqNautxuhzCa*p4lWQQYzeO%edasOQyu#7?>VN&P+>c?VJCseiuimJ z-D>qadwOOug%*iHT?h4fjO67< zOtXo*AMQJnGGk3&gBpGX&ueF^T1;jzeX-+|KeY*&!zyX#+ZCH=J-`)k-+eZj(A0$R zq5>Oa06*IU0CB*hC90WA%(cAH3Lhc-_BdXiMgq?2jFV{G-(h(Lgt4(QGl> zW4l9?ySR@F0DoS8yZ;zDUFfN45QS#0nDS;5k+Lw-^;I#h9Mo7`^K`d1p{<}7*QHa zZIQBu9hxBa61;|gfm@QkKGpdhP%~$7`TngR4F9ksx~MZh`1A!Q@e>+ca(1Yh)Jl4p zR!N&{h{G9(gKHY3Br^z2W$7^u0j1Bd$K^qSN_dac+7@t49i-{HmouluAt(mUqlRcJ z>>rVJ>#3a_kdk*!uZwoZo#O`zb!|0`l&nli^;DDym$1$l>ktgkxRmQ=PzB116gOPo z?xL43OQv&cUVu>{fPE_m@GSn_0l8D>PU{)1`r@Q=i}tgfvO zo{z)VHbce1QL@Th)B zlK-!U3NxNzg4Emu)n}w2PDBV%l}%jHu+l?6yTpsmCgadEfjk!{g83R7mpsHw6Yu@! zy#Rw9YDQu+icyZEG+e@PG=wt)gsS5K+oHI~G)-qfb$vfOat~4$OHjihrWR_B%|I07EernK#Zq=bnop#0gVv^TbUDxb0GyRL0mV6#8(_OF)>X6&7C%vp=P(T?W5C^XG z0YH^lfaVGm$_d>h1whfVhd_ur?s)HGPbEP(_*PAn)HbD${GFdpNH9tJZS@h3?=-*iPM<|W`^1{0EcB>tueTDKcAtr1e zorlr7Cs9YVSO#B5P;AFJOgLVr!St;ig0128)HVQ7HG9KE?#=;&l4T76bFITQ)$!@4 zZ)YNuEl)1@?{eDsAL&CcS}ja=PUp?x^tNiLN_%1}JET|ZOpPDfGIZYr9<`TXBSRMJ z4t%)ge!Hk4##tb3UszdMy`LJn>|%Oixg?1(xtb3LqEcSPZbZAkPe%j9u_K-Tpg|7@ zQWwpb29qehJaKM03ubKi-uBb!`m(h8HQ~*ir^oov{xpe8AHPM5pY{+e&?F-59AjNJ z_EM!K?JU)RrjNLMC4XlC*k(B zX!Yk=ABEcC=&r{OE}A+VDwez)#e_bdCWnM0^<9duNBMZrjcWzIFI|L0@cZ669~Z`}5GJ>6kI7hdkt4*wRso!{4$H9UavQ zT2IN^>lO#8p3bgv36hKNUym{0o8|?f*lT(c}yqmqrABy9JN|n-o zw})$XJm;4sl)R(Qm}B%ORdXO3_rzK!b$sj zrf;J)fp@a^&=`GC!bfQ!V-{JN|0ik-*+PLryh*zc#zDF=<+F5^c&2)2J*)ENyADXX zNT{FbTod5nJ>#P8W4gAm7IEmFBA={OaGWV%^?=82uff7uf2KQ$am)8J)$mq*ogC?b z5v`b#%0u0SSQhq?2d@%@%y@R`)mIh@QDrHW!3bb^0rd)U?2GyYLv=CGmuE?2XGX_e zPldz;Hxi3Uxovu9jYBJWL$}lOqUNGq8ZC1*#z+@@fw%J8_eCNCmecgJnX{grVW<4; zS~;#XmE`QU0D{s}eNJq^r@mhPp4m4Ujq-JNkL%pivwU^$R0?GWxLyN zT1Sx^^7uwWOpggShrr%6lg%^wxDb$mS>pX*9`F3Cso;}A1Eaf-y{lVu2sTH`N5NQ4 zo(fPL(uv^Pq7O^l$Es)rRYncm6qYx&&5l~gv+?;~EfC{1z;_D`$r-$rJqRmb0o*Il zna6AA+qSIN3S@c`t}MeYE#ytj;O%FH8ZJhT<=KcVhLUzN z)G%_|*34;$2>YgZx7=h?=0|4JbQOyXByYw`AMV4hv^isae0xLig=_j`0KqguLLR6Y z>&;IZ34vqQ`|{`m5+3SM}D5s}KR>l5w=d^$WsC_=)Dk z?e_R$F+En{*({5MMO&caC$TtEA?8e-70YHE){ML^^MW7l0QV4VHj0$Mhw^+m#r$Md6A5Z1Tmbse`*zEuo@L(u#|IpynC`|oNhgf9o0Wiei? ze2W)Ezir@>Q@;5XNAyhV8w+<&xG3jVpgTjY`+n06-Jvnlwq1Gie29%QeN)h&l=*8( zHnkqceL@Rg!R~BqLhGD!-Vjbhov+_oSGWGY)U&c$oBs81?=f7JJJc@C1p`Z=FX^Qj_s~avg zYfjEbTRRCx*6Yul+&DOUE2ykcL4;zx*sC}Pxx#!Fw*uBVwHQ?qzWyBYl5XU`^guQ$ z#4b{Fjr9+*FTJ2X#zr$A#0&qhR zkkS%B9aJ9$Dbmuh0;Y_RuS|y2c3*IOvHexgQk-AjD_W7|%|B$c3le9OC|ku&on3f7 zlkZmy0#-KX@V`O#$ooN%-Y96A9_GxK0^~(?qA30Xtwsb4+#GShQlJ%#gH67qoOH1A z96!6X3jFK&SAFe|`g;UOk&IrNbQn3{jwdR@Co>rNRf7Q%x~N9MXgqOE@GL>hB_T=8-C?5^g_^qpNdGHVzyLRoBAV!GUBq~3fN9RL+?RsNPPq_ng9!%$A>-1Y0 z8N^rAq?2v(M-#%}mmgup0@`Uidu%(yvq=c>fbqy{c}J1V-=@5ihZ-Ly>RiX*kxcB((PY#^71Kd8FVXCT=+n`C%6E<;jiymu+0l)38n*ISVZ-szkdla-_ zDeD7R4NuGxW;tr%Vtq=jfh?;;RKNDM-sJH+Gk{$a;yKK`^I>^-6E&v9!7UbaZyX z=WPYcO$>k4j!$_*w444aCwu737Bn4C^^q8Is#4g=YxCyMHBT4s+!bhj(8fb5JW`1Q z81n?cd4l_7LV&E}0!ub;P(#JK=SG(^8|XASvLUry#KQP-vhuiq6H=; zjFjy?2fP?gWj_PISE`THyRO7(9l9pVJnruq+p-2}#^W7^lW^z`oD*U^)s@cqZTC$# zM(isB9YjXDOF)}xr^)1e01)-cUl|ox^V(Z90J*YhTnGIAyO6^adAH*JeC+X?e>KF3 zRuUIUjlrYAu6jcM})@IpV$yMu)ll*m>Bj)>!JH_ZQ_q|0{= zRkpC-f8Ql3$?0~4nZQY`HTMtk?GO`(fznHdvOCUvAT%r-v7lv?p?K!xC${^i9$3oE zCeA}sQI#1e-YDYn?yW8u!xI~c_(MoFEe+}rJuEDSx^>+h_~nf|0;~B6op1kHYAeSW zo}BLVi*@W6<*O(isE+eZ*JTvKYQlUJb`QF>?!drw71KP~tTksFgjIOzIV<+K+49I? z=-Pa(l}x?AqVK=!zJdVVj(vjZJ2ojncgL)A-748q$%7Ye^>I6tthrLa##yx{>+S6B zRp2JyGO&tShF|xk%m1#j>HaFB=*QbrN6}WkT`h2#-)0EJ-T1;!;b~={6+WAkj)AT& zF5W`&EWMZZunYV)PTjl*mq5Vb2guVF@3t?z|B?vU0wgY%ol8PC#jamns-;JsXc;o} z!<^rv%Z6|efwYnvIY&h{_y^46>!yG2CTa8Qez0(4l!mPC`IZM&C(1ST6&_81i9c2V z8``?!ziIl9!zO!}&1~{K$vKnP$TPPM)8G_Nk{1}i@C4a-OoI!&zJfSmxk7|<0Ib|A zN~mr7PGuff0rT5)aImm$7`hQDkIjaeU(q0vZ5aBQM|$vWPt>iy#kddBp&!$s`MHXp z$yTvz&rjD<-lz>Qar^rrJ#A`Q@+$u^y$2(fOYZN^%Qnt+)x*%53npy!O&m3ndiIYk z&cWn)3Rlya?bo(%oN+Na?pNH@UP-dQA2NjmMEGn(*5gS1G-6N`(@0K@U8*1DmIUxK8(1@XtI zk;fK?(nAgkRBp?&4;ZU{c^Ek~j#2(4CD+!Ugmdq1nG^i1&-D4Nw87iLhPTpXo|yY= zBJ)MQPD#|cf-a^RJ4j=W><1F<9kGyDQ71Q@TAB()?1|SwNn)FC95&#SPBE@c(VIk| zs;l)-1or62k~N#aWoyP^a+Cb0*?2!Q$-{`l z%b3W}HAIE&Ya*>wvnE?iS8$mhiUiBY|B}7{6ei}&9#hAvWU(ipg1xa9* zFyAp-GYs(yq10AQOT!Q7D6rLY&f}7W_r;Z{LzGx|rbZJ(1&29r?Cz7n&ih_$JV*U{ zdB}cEqAK&rpD(g{VbdKFIF>OS&-0IVFgJol-O(ZKH#>1!ui=s!#Oq8as6CiFky5Z2 zj^C<^(p^AUW7%|FlWzvG%m!PlM+u9OyW~V|UimFv#RMF0?sW-KWgb6_q6+43X&l^9 zdetp{#==DPn}cz?-cZR z$;4zVkD7j=j`8Ada`l$oHz4}VVzRh9D@e3x#9P$pw!afsGy--m@95(D)FNtkb#l#v zX*X4{dlQ)QF-)n$oB)PI24R|Kz<-z2Q1zN5W+TYj#%b@35egL9TUX8~NDx@x|L}2egv#7BJiLI4s`-&V+Yn2cn1VQIWOR`8ydgE) z!EUr~I1xEU|F+L`3_gVB31_fu%d+|#SVbXvJ1~j{lc?z+us;!*Nbz#ndaQb~$Q$X> z@_@$)`7@7@&7V+YBw{if`*x3w>dC=O2eQVMBmE|`A?aNGZ0k5z z*McfDk)}j|tV_;y^!IImO8uAj^!TDlx3KkoNtuR4OwBP-*B5q0OL0Ic@LHj|9$CYUOZzHlOG`>(Mj|&^7RGS{fuHKplf3Y)Z$Kx|-iRf2SI6QDkyfMVSoCWbxIm4ms;%lbW}z>s7m>H>@oV*|ufOn+jF09+~N9 zk!nDAZ2O8qM<#Rbp7S6J(E_ts$m?3oC+% zidMvZfsB;1^DQ73?ho9|p>lE;-3vFN;r7@H{pwO~J~`3TPg+HWPc3wrgcSQ#;#zpr!I(V0SCIGc9vYYMKtppT9J1dhs|>$&pJ2aOTo7+pWiZB+R6pXe_TcX zF3zLK3YW>qq5f$8wFk+rnUwX0?qA}GieSd2#*07QCww>mX(tb|0AKa#pX<0zw@`KH zAc*5|bd_YC{S##Oi#0l}Oj7IuEk7?c8u5VrKikL`^|qhNPezQ!bqxy3oLU{Zm2+;& zJj#jadJTMnC>l6-_lz0tf~tkue~@Nm+0p!PyotrI!X>SPjb04u8hVyE?_0K3)+nBK zX4Q$w77c$47BxyAYZNlt_O!|nDQKx`7jEoI%TUujY%C2%%scqmiw;kUZrCwo&bzLZ z7d$Ks7M%USE)s*pmcmD?! zdQ3+&Y`tQ5!UpX!9`UEK8MX^W#J4H1LFK_j!CGI?v&~U(* z7w_hjZ|<_aA?UM3`i>s<+p6#HY0BVkK7yVyy#GpGGHjK+zDbc%bjnEYD)YU1cH_{e zA8V8NWTItwG9IMI*&Y>PlPV3?QR{3Uy(=Sa^d&L*n#hWEjnFKcB(L=A2tuV)wW%_q zCRJh;TkNV=2_rWfXH9#*H1ts^i;g-LQQHN=Qd^O_3_yel)U+k%c(vy1qNPUiTC znX*I0rWYr_`0U(6gb>o)xMoVSxtAv2FWMJ#)jMAL^zC4L*Z63LT0x7RCP(rWTh_CX z@LEk`jpNJ%XIy31Slw~n>qKPV`FsTx`YeBR-(cVPBH6;EG#?bE^v*$oC;%EV6XwCL z{56@c)jzzE8M{^DLPU6xWgp-!kYuOCIxT+ZE;`S%R9R>?-`Akyz*7-;D-=i@tY$vOOn%^r}}w8V%vIhONHrOhXhh$OKW(AG=y6oRF0$hyB-QjkuC?5e#h2S z?w1N`%N||3*PtiAY8_ATi7_9A@LOnfMZ-ghcf|s_sY(Ahd6cwt-tME=yT0yy-vfg6 zqEZW=;<$?hk=AawWo2sT(Ck$qA!2rnW0)}gR)=5g$F_lf*Rh!xxy}nua^zimuzk_q zjwy*Y8CTRuPLXi5w3aV-u>?Jt(cktgm1;G6V=&){to`W@2k9hdSDUr>XYbBR@YwF* z+4Cie>qW}FZ0&bMxQ_&2H~zs~>&0PY^3jToFb_>qLw{A1`U zmUMiky@G>lDW#yH^!=~4u=l5&l?;9|DyN+8HmdujYx8=`xg(j63$D2{oJ4%pWm6cT zDsJxQGr1$mEp+<<5WV@_4TkV&q$MFDUMKPx*PLIDz6V=;&Z0~0PSZJ_l+sd{o3|HP z+@0%-?P*nS6iuR);)OCf#Ln! zWOcw+A*-zXH{rWR99PnsOLVT6Uq2&~HI8lSQzLKrHwBDzhSSVrZsmJe-dRosdGVpu z*SQ`Lmn~6|;9SUcIj7F+91-N1MS`VyafF74UL||| zW@b~dA&272!`%7oZRu62tW143vU>#Vj@9!wE$33qFjrmt^%CFxVmuj@s07->l+6XD zC{^ka5$PAI=Ila*gKtgZSkeeXY|2-KLmn;tpGS%5D%f1KqPfJsxJ}fER+LrT)2S#A zrz93S%b-zH4$EO5q#D63Z*Xi`B1ipaToIZ%rOKUSP`+k=cg~E4`qC%q_9FX`E&-JP zWLOFD-`B#GDUD2^y=TekR~dg6fwq~O!I%b^Wm0{9%6LbqD9}9f68a=5TreZ*^5S63 zPfJvmPLTOF)AAT>^o#G4{6U@2F0Xjn)zrW1d6O*i&kwQcf`pn#t;il*-Bj7|!!(Myi&QxR+8@_bi~3`y z;W}_dMGYE9MGcIosDT<4)h)RZVaol#hq+2}!V*VxWr&-P=O`t#hsKk^WHuc0-l(|) z+1Fz#%1=J^2Q`<}plnImb?iao*sOsOn>A2lv&y>KSW<(U^J!2vpX^%h;J&e0U8A8x zwV`H0`c;ZD&n=af>b?@!)_Gu|qWv=Ip@b4fA-Fy}ef@&>P|f4EefM$Of&EGi{-NoA1xmdk)AdRK}sM&vsDnJh&V^XuJ8{UUK7G<_KeZ!tD|A=MW03S z2H+3OK_V3SPGKLEM8I3%z~?FT9e(72D|TwoFm{U7G#6ga-WZ{qQGv!rqW!m**K$#D z`BrEY)mHhaiF8h6!M0ISFvn{Y@~xy^&25yPdmCloilQ1cjH047kB#o>s@*d&#`^zR zr3A!Dw8lOHcQ9egi#6U`EF&MxAm-a?a7CgRB}<&9O!~8)7}c|AdLySrGjIfO4VngU z4LXJbd#rXt(O*q1yERNGPZ86CTQnp=a2enb0e=csNst0KcZPHi91&52rV&v_F#bS^ zh!U-^li|`L8!M594mq)QX13&{%RrH4t0WLdJmhiDUd@BAJ@>)afx{CzXzB?y(rFDk zs>0|#zT-}c*Q@FA@3}qxuB2Oyb8ZZRB`R>e<7H`p8zasQ7sWQ3z~QQv6!vYK6kdUXL8@<4>ETYmQM-Q|Ud7o_tO5^#rrABBG= zY{OuGgUA7hRs=*daizYqNj6R}X{^*tbfsouDm8@`(fR=*DA>r0$X4MhMSj*g=D*KY z917WGRa%Kzl+gZgwa}(4O`0l86J0@>7qrlO);7@Rg5OOVl*)nBS(5tR?9&~BM%s@IMm4) zm35ooJunO-!j22Q#wp=5oE<;mKlw7I+$c^W52dNdqb)9K^VKs5$MtR_KXzS4K5^)b zlcqZ3MAsQ7hR#^gIe1(zJm8o|2k2Ruaaej-n(xH(&a4-Yam>Rp7`F3eoJ4CD;l%zz zzz_Mr(j}r^m7i`x0zY6edbOhcj$Ofi6NjojX{u_|iiYB#=?%pI7slmS5_s;wUaY3d zbr!UvU;S`)1(rBT#L$jv9iBNJ9XYP`^;dC#JvwzHC-OuLAv=m^XmqabbEzfGwGzGi zG@YbtPSX6QQeMUAx@eV9)l<74gw?-7Gsq9yeJ8fIMS9EtZm9GpkrbF&vLU|AQmPoF z*he011RsxD;UUMai>xLN8)wqg#+m3g&cv{Bik-T!b6z?vH)S%s(RMHF5|5gUt~2btlnL>{bUk;}%w)H5(#7hz2t zR^Ozl)i*XS!J9s&ey>054hMhg_C}*__fMev5Dnb+ ztWpA#KXvbo%WT~5CUCL5;7+$1Y>CL-vz6}ZOim<Q2S4_&tl5CIUf-@gFo7uPqZuV24-4xXQ1y*Rsh{XY!jH9rr# zx7P-j?2I1p7RbA0hQQCiuCRC8rb~o?`3n0e%|$`Z|2t7KKU~6a1%t!?m({qYHNNe4 zU$Hue-Cq0D_i;FH=X2rk0L*ZblFnWmTqDGq`}0ru7P~MU?6tvJPTF&vdQsx%rG5UQ zGoK%lcj@KL4?o?IgjRYJqYyywGZRpCL|KUL4!uPbrRZR<-EQxl1_8Lj^94z%YKf9H z@$4b%(vt#Nhwq$z-_W|Bvxd9>(L0DQ9WF zV*|dor_5)Zf;hoTnBZW;n6OWoFjFWuY~Ej-UW<5S%H2DAKSXzEjgqI}4vEvVyetd? z!T(c`5*Ye0@i|tGsRPbK&i1pLz9~teB9m`x zGGOl$xcM9S1X7Yvj{gb#(t3My*7^l}0@sLu>}peRgO})EQHUsH#dOW@J_VnItCj-! z_#1=3Zb{t$7;dcAZVDDCVdwv-u}eQD8-NK~rXBDCdJDUWoGzkOkX^NwGGEax+H|;N z%5zD0Fa%S+dD4+oQ=?O%lXCqjqVoR}W1`X@#Rg5JX-GjzCld^4{dN?l9a@xK^vB?H zSIR0uK3Ii5O85j~1m#FOUgUFrotXGlcd15&R6Q~}AQNB!0t&1xpmCy@OU3h0nt~Y) z5S_`S0)a21gu5|uIE$WUVwZrQ>Fo3)PY7Eo+afRRD5g4-TG1+LGd8Vp?zW)3EjsM* z8-?Hld#`lZ)q$TtfKxVser~nfa77lar>!swQR^RaMk*aiv9UFRLj+(lXUj9~&`FzO zALVy(w%e-|C2b!P*!FS4Ix9bJOF$6ud}e$pa`0LwOF-P~m^zxkosT~F1g23$2lJO1 z3{pfXe$~#}^>Pk)S-DTG! z1@fjv$#U%tm}BBv-)~~hNw^%KDnDN@5WK!T$Rsg};`Kk+zIKFN{Llt=yOO`6IK9ajA zxy9l9IZpIWK5VJNmBJJy0b_0~K0>U?C`KXj#YrWVp%JE8ozFlR5q@fm&k7jFyt34A z#Cl#vtB}NSAy+9goD@#LqZ59lrPS7hh@^`sDlEzdLN5cAOFWW9D>|{+YjKfpmf8iA z1zWzCkzY|7TIjCD(=!UUF?0obGj^U~GI_ZQ`GGijhN~tY&+1j=;&Bo!3BC=|n)NY-$ z4%cybDC@TJPt+K0owO({W->5IBvxJ%l1j8T|0Uja6D%wj? zT?=J*pRE;kiANhAfHz?vuLP5M>Htmw3ZvD0VG?3Si-cfdOsU|-I3W>d*ZPk|hfC{bdr8PeGdhnQ?EtKd1B;gDKqvWORjDZ3Dj zfMms-IY0lLpxHn2jf2~44R&zEIP{?xg&vAYdYF0(5*dL8g`p3v0 z43E07i_mZ|o50!ls5e9Y$REzUes47Djp20G^M*YHeKbBE98LRU|HwP``rc%8G$^Nr zVW$+?bj&wvlq6J)G2@Mvkangt;PO?$fUHQAdNANE$p-c>ati-9Wp%y}Aow9l@V{u? zfSOR?R8$mjax=AblBjMV_e3#(HJdD|d263BCYlM^cl+^qhjwYn>+Ex1Des~hZV$NwJ zs7~?;{L-U1E>k01cRHoWs9n2ZVTO zu;9f(z{?vjBNm_XmIYIGVwe!jWr@OHLmbGCP#OuY)T%(KT81HAC3ED0p7*8!d9t5039isuRR5y+~&j1urX!<{~*x;OTvF+w%p zD|rFgzK{+F%(bRb$-NENVi2y870{dTISLR##p*fe4tUO{C^8s~h4M2R-57=GqOID;{q;s6tjj78sqzTZ0e`5#YPeiFs>FUAJW@?B~c z)j;Q~ZnShf6=t*|)Tope{0 z6^a~*>!GkryU4EQj#eSt0eXA=eHPoR$al8K?-uR+vm(*e)X1!HVal6fbTPGCxz3aF zt`;NNI{BG@Y@M`Nw$|3u7MpynlUA?w+drPRQUnukfzoVTQ*)mg`&X^ zjq|i+!kyuEBf#mB0(MFp) z>PLt}JKY^{Q&7*Y+0i!1D^9@a0l4|w33z*R2EIQ4m#5d)KRrJIfByIpbgsnJ11ui% zx8ME@&hi56LE-vk5-r6q06HBx7VLdNyvvU_abRhO{K^7`M16ai4+JG449-J>k{R?+ z(Y}0}A`uaV#hGMC2n)?&8w@Oxg0FilfplaPCtcfjFhM7Pg+fg?F;8}Wdz5CAK+=)G zQ=56qOi}s)=Zr_HqWLBYWt!8CG*CL=GK&_IERB;$`4z=C527gyIJ|$uj zg#;&vov@&IaG0wN0vb*Q^DQnGwOAE|Fa(h-B3r<3#?7{01?dbjUCJzDx?}v*??Rgw z_ral%B$&TFM8rF!B~#D_OBlzLtn*7+Izg$ZO20E6d;hfyeZMWxw@JiYQ;2wNMnU@y zlLh;;4LRM12U$xc)3WsQPx*lowPc>~ViT=+=I)H!k_i0bV3WUOC=2dTF;=HR5Zy^< zF!PzC50n#Ol2?ssCrsHsov6Vsfy zwqjrri{qg>Pw(iMPannosbu7 z>P=We9R69t>8PZ3=%+2#Z?@HBw@mNYCJRPu!5)h;`@ig6-E-SGlFzgM3Lf*Yag{`q6h%p{ovBKk-I>%S8I|qq z+||`o1d^c53q|M%(pk-H{`V_1J_vqFvgNEZ6+I-D2zEEV8jVKx4;NrEQ?Qv;Z&&TE zQ-gHS%?4)?r_3`&fN8~rs#qNLCV!}{ccp|+sBZ|QeAW1SLGgxJYxuM#2$PPK5RFBs zuyNOtFU}$eq-?h|Xzl;8e}g~jsspCv82=NkHz~GK5~36o2~)CiacR21#4H7Kp=%;2 zc5pf`|L6*mTEemAQOLKCSC_CPbF~PgJYt4*Mhb&1hBE8s#~%#Ga=fv<4X*wkeI;Ucsw>(nydfH9q8Cd`_9lTc-6HUAbxf46|Y!`X+>2#Ms zTK9Y=`6tzsJ9gOh;$6!`i>QU=?!CU+F|&o_62eLpf<8%vVbLIS_$IJXxfaRFvG6d_ z_(*E+10#P#Ftx;a0zI#c3oQN@Ka6p;a%LpbJuywq`kqA03{S;{Nm{(v(F4UY z2xH-ra37oqaT}cEdqf`UWbUVeWvpG8CY771Io)e)4w&uYy)h@gAMX~w9TPtYCur&i zZs;tg$P2s>PeXqe2X^S%i+D1(C;rrRa1c!#KZ;#6i~M=uxzk_~dh=jn?rCdNC`*uj{W7)8J4Nr8XKLhkr{ zS(Q{S`6`2yX9QS$L&7%#ptRn;6{v zpHU_-TL2(0Gvtd#$le@PyHjzrqMozr)m%l|vezL{O!5%7JR5vrfM+tU4gi3GIVKNh$6BY*M7)kvL+6vX(;_%9;5fa=tPvZxOXEyJ+45031Tkh8jnTaHl# zk?kGBTdL(G)+^P@>o6FNaka_o;6jt%8$)WbSp1Zzv?9bihQvyL$japS|4K{?RijRg z)yGx8c(cn@CwTD!b+AcA`%Mg|ZEPTnS0f|ZW@w#+T))wTWa8358GBrNLES~T8r7mt z)yp{VaCD0<)G1N2#{7OloKnn*LBebOa#8)wGJ_*t92qY()~7HfInk_4(~*&p_T7lg z@`G?{g(Ul5iG&6IzEw>nt}HPInH`G^S_Wfq%qD=1 zz%#(5?>4HYv_c3?3d-R*dn9bfSZ(e?8C=y?7{=6I+o4asi;Ps~1 zzE1LyaD&u{}B9Gd1%=C7|ha2ZX3oBff6LW33fjdT7XjJ=m;dqG;CuP1Igq) zV^m_2LKZGj=i?kbe9VkOLY4IQ5&rqDkmc04{^j*AhKQyGGlqaI{a?l{qDGK1mQj;) zU(NdxS%W0INB(LjhwkZOLM)QTr!{TFYPNIIz_>(d3G;X*>$B<>D8hGpX#>?PT%O}} zT%SaJoe<%>V|0Sfp~tcH@5vwTl(c8KeC<)vr4{9=WJ4)}2nVS|#f0Kwsol@i6ZZqB z!C;x{mpSn`xbT*I&iJh|a8Y$9D{gu1J@~Jn_*a|*m3(TT3Ke zO`J!cB^s~#WKjd;ai&a3^CMXXCC$G{>p-+X-{K^yb&UBaISpD0b$*XN(D|P9psl4q zL+jo_)ahBmS0EhIB3W)Wn?Z18Wd^H=N}##cozsHb4nEv@uN{j0VSd6}^W2mu5a!6- zaO9Qsb_}@vXY1`)J^k`q!!Q?YIo;tsUqh5X!M3SUqy9}aFF3e?77e-A?zzGDkvDAg z7Ukg6?><9PiDJ@$BbgM$fL9evdhMbr`XK!VyrLv;8xUMtYmK9%>^vusL5HG5K@9U9 zUXy%lR^tsB#d;G{XYrnJCqBgvu|SV3UQzQ z*Qf|@&5;SW z@9FQs4<9Jb#drMzE+|*!y4S;prErFnPL7JDsz6?#v=6coOwBL)1eJ05;=T5%ZAEk_ zVnpDr)YHs)!vb9mi3sS)Yeo9B-m)q&80B11`ignAt;lP8a<2N|rT36+}^G%@%A;1{4B;I4Z(5 zMfg5XY3UmldmMumh<<|Ana_L(`BV$L_IsM#;S5tcW;?;K$a6FJV#(rt zlD(DBp?ud^t<$mO>3+vn7Sv0^xA@$vn24CKgx-SbB6@5quauQkm%zM>-A+Jvo?ua{ zL>HZALZW$QaytMSKVM%j#hWtXNJ8Ae7+}xO*gsbaCE--dtds9_aixue)8_pq@H|d1 zzn`7;HLW~eZRo&Sb6GN?j)yhk$XM~dIS25NmAEjCQ@rsc-d-8o+%mbcrLB>@zqOrQ?oHMYc6OD~5ZG&#I>V zjqr6xXvOx(L$uyzM;oI}vYl0Vlu;^_YhM#xiN`xesGxG(@hOP5MyF)9*Vv@B3UpBU zs^d~JJ@Tm3Tk2?IvQD(45=S480BJvLe=4B<0qavIbWhu}j_cpDJZl^du{*_!yBM~a zv@K58@+w4NXXapg9)(flM1E*5f;e7yi*Pavu@`%@sUIvbww;L^&!f5LPn^Zvj}da+ z$<%jIM`}kyAZc#q0qPyM(yL<#e49&>@=Rjw`>Q02BsvYFWrfwV-COng{#IwxMNja0 z0NEjF#k0XJ{mZsDU{C4~AY0M9M>fPET?bg_EkBeh7XV-$w!^fSj%GGvM+ba-11?|;P|d5$S5^RNZ$2neOrJpaQCH>G)Q zdbVw^&5_C7bLP1@|0yxQj7$-Yua$J_<)-$##Qak8oJgKBl%E=B91)fFq;_*r)mE`@ z1KI|zQVT$}%~bee@+i60%nBT?AjXDl%9QIHQC@*ih(!|CK+e%JUI}bC?qe+=V_t&; zWh)cT!hE|C2~uKZ9r3sfIIRTe1_-RVOK2kChETQ*NVMh5WiM*S`r_h%I7!7CD#11z zy}JDH=CyE~eR%is>OakMx7IUDfx+;B;@o)i+IYcUI5lu~H@-u;A<=cxZH-B{zYn59 zmU(iQr1%E^jfN`WBU1+eWy7b9BswxT^8HA?CeMK{2`T=roZj+M6z~teC*Viq zza8QW>_8NdxG;NRcPae89WG~8?qSGX65&P{^l_29YD{)n#%;x~8na0%+58=?lQikT znPG-%vN2-$9Hv%vw9nI9R37r1<()TT|N6a5wq1tW6#!LS6)61FvQm(?K6H`(_Zu9N(Wa;vY6y+zT~xL1}A#oX>nT= zo1tj|)bBfZIgZo-$&5sJ*#kCJ3y6{Bcu1Di6>kZOUZE6aABWW=*doDSBl4@B!)HcZBG(+6oBhq8$k#`p}N}NbH3=>aPMRNC?7f z%7bmrIWQZeD$7{L6;FoNO@I|EyBhKTuh<{g7t0lN_v*vz<;pVnPM`fC_WT?4IWv%P zeX*>e9^T-hnyCO&%jVCA%eU|p=CyXHG*qbqf*M%a#7BkAusacDo-hgyV`b4itL zQfcR8if!7PWi4Vt*OK}|z22nw1yinpP_Cz=nywugir%QwxtbU+<^FEaBhj%LtiONn zds)=1?z_m-14Gg@`2b zzQAZ78Hf`}s8m`w5>C8A2ZmN?mzsbF&cQ(&9mp0Dguu6&^0kCktJ+cv8sfKVlgP-+ zj6;qJO0}zRI0fit>n2AbUgA7~&YxksJU z{SH1VM%^bL4IT#^eW*8g^6cQ#5pQGJmTS9?y>L8*Z#6^Mi|4j8pUkIo9Ql*kBJksR zJoDo@j=k6kyqOoct{cql=?vQoCqQ=K;c4uNT~_ioFB{r|FbxQ z?>SC?Fln((F}=mOFpaYxPfngc2khT5s0;S>`Sa(-RfsaCQ_8fUCnqN-|1#ba<6S~) z%ATzyWfsZ1dzijFAMg773piG5u;j>=cL);DA9YFd@9wtmpYNaVpYNXsfBruJ0RR8b KjQ$M(_y_=a + + + +### [traefik-12.0.5](https://github.com/truecharts/apps/compare/traefik-12.0.4...traefik-12.0.5) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + + +### [traefik-12.0.4](https://github.com/truecharts/apps/compare/traefik-12.0.3...traefik-12.0.4) (2022-06-14) + +#### Chore + +* update helm general non-major helm releases ([#2886](https://github.com/truecharts/apps/issues/2886)) + + + + +### [traefik-12.0.3](https://github.com/truecharts/apps/compare/traefik-12.0.2...traefik-12.0.3) (2022-06-11) + +#### Chore + +* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854)) + + + + +### [traefik-12.0.2](https://github.com/truecharts/apps/compare/traefik-12.0.1...traefik-12.0.2) (2022-06-07) + +#### Fix + +* hotpatch to disable HPA and networkPolicy in SCALE interface, due to incompatible format. + + + + +### [traefik-12.0.1](https://github.com/truecharts/apps/compare/traefik-11.3.9...traefik-12.0.1) (2022-06-07) + +#### Chore + +* Auto-update chart README [skip ci] + +#### Fix + +* remove malfunctioning SCALE migration script + +#### Refactor + +* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) + + + + +### [traefik-12.0.0](https://github.com/truecharts/apps/compare/traefik-11.3.9...traefik-12.0.0) (2022-06-07) + +#### Refactor + +* BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) + + + + +### [traefik-11.3.9](https://github.com/truecharts/apps/compare/traefik-11.3.8...traefik-11.3.9) (2022-05-31) + +#### Chore + +* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) + + + + +### [traefik-11.3.8](https://github.com/truecharts/apps/compare/traefik-11.3.7...traefik-11.3.8) (2022-05-27) + +#### Fix + +* set trustedIPs to string ([#2764](https://github.com/truecharts/apps/issues/2764)) + + + + +### [traefik-11.3.7](https://github.com/truecharts/apps/compare/traefik-11.3.6...traefik-11.3.7) (2022-05-26) + +#### Chore + +* Auto-update chart README [skip ci] +* update helm general non-major helm releases ([#2759](https://github.com/truecharts/apps/issues/2759)) + + + + +### [traefik-11.3.7](https://github.com/truecharts/apps/compare/traefik-11.3.6...traefik-11.3.7) (2022-05-26) + +#### Chore + +* update helm general non-major helm releases ([#2759](https://github.com/truecharts/apps/issues/2759)) diff --git a/stable/traefik/12.0.5/CONFIG.md b/stable/traefik/12.0.5/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/traefik/12.0.5/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/traefik/12.0.5/Chart.lock b/stable/traefik/12.0.5/Chart.lock new file mode 100644 index 00000000000..d71a907db19 --- /dev/null +++ b/stable/traefik/12.0.5/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:35:23.316012567Z" diff --git a/stable/traefik/12.0.5/Chart.yaml b/stable/traefik/12.0.5/Chart.yaml new file mode 100644 index 00000000000..ae8d12c92dc --- /dev/null +++ b/stable/traefik/12.0.5/Chart.yaml @@ -0,0 +1,30 @@ +apiVersion: v2 +appVersion: "2.7.1" +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +deprecated: false +description: Traefik is a flexible reverse proxy and Ingress Provider. +home: https://github.com/truecharts/apps/tree/master/charts/core/traefik +icon: https://truecharts.org/_static/img/appicons/traefik.png +keywords: +- traefik +- ingress +kubeVersion: '>=1.16.0-0' +maintainers: +- email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org +name: traefik +sources: +- https://github.com/traefik/traefik +- https://github.com/traefik/traefik-helm-chart +- https://traefik.io/ +type: application +version: 12.0.5 +annotations: + truecharts.org/catagories: | + - network + truecharts.org/SCALE-support: "true" + truecharts.org/grade: U diff --git a/stable/traefik/12.0.5/README.md b/stable/traefik/12.0.5/README.md new file mode 100644 index 00000000000..3f133adecbf --- /dev/null +++ b/stable/traefik/12.0.5/README.md @@ -0,0 +1,39 @@ +# Introduction + +Traefik is a flexible reverse proxy and Ingress Provider. + +TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not guarantee this charts works as a stand-alone helm installation. +**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/apps/issues/new/choose)** + +## Source Code + +* +* +* + +## Requirements + +Kubernetes: `>=1.16.0-0` + +## Dependencies + +| Repository | Name | Version | +|------------|------|---------| +| https://library-charts.truecharts.org | common | 10.0.10 | + +## Installing the Chart + +To install this App on TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/02-Installing-an-App/). + +## Upgrading, Rolling Back and Uninstalling the Chart + +To upgrade, rollback or delete this App from TrueNAS SCALE check our [Quick-Start Guide](https://truecharts.org/manual/Quick-Start%20Guides/04-Upgrade-rollback-delete-an-App/). + +## Support + +- Please check our [quick-start guides](https://truecharts.org/manual/Quick-Start%20Guides/01-Adding-TrueCharts/) first. +- See the [Wiki](https://truecharts.org) +- Check our [Discord](https://discord.gg/tVsPTHWTtr) +- Open a [issue](https://github.com/truecharts/apps/issues/new/choose) +--- +All Rights Reserved - The TrueCharts Project diff --git a/stable/traefik/12.0.5/app-readme.md b/stable/traefik/12.0.5/app-readme.md new file mode 100644 index 00000000000..0fa481e7ac5 --- /dev/null +++ b/stable/traefik/12.0.5/app-readme.md @@ -0,0 +1,3 @@ +Traefik is a flexible reverse proxy and Ingress Provider. + +This App is supplied by TrueCharts, for more information please visit https://truecharts.org diff --git a/stable/traefik/12.0.5/charts/common-10.0.10.tgz b/stable/traefik/12.0.5/charts/common-10.0.10.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b39f3b3a8f32cdc206c3bbba091c49a15329f972 GIT binary patch literal 46486 zcmV)>K!d*@iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{cy>x9z#s)0XXMCv(^BB;7uphmY-~@9yjz z2O=Q}V~S)0pd3v)-~D&+BtU`^Q;g!A}M zcmMQyz25%bp7^)d>y`iQ?e7l$)ZZHn2ff|hUa$YBUVpGR?EMM!?g5v|lT!xCpL(}$ ztK7NoluqP&C$RYfRhXMXL=|GgtW-nXdl$ z*XR9Cf4|df_kL{6Ax;>?2_ga*nnN6q08S?9e-(f`DVeqaNFeX8MF0SD5*O%~D#+pr z1Gdc2NTb(UXk7ZePOsDNwH{{t)%;(;I7jrJ1i;Gq-|z43?j4lp|3UxYasEHV^8~cp z;9Z8252tSd%}|IZI0RvuOz<=(kk9qj6YyUVn!r3}yzn_fV2tAQx|L=qS!Bt{98S@w z1%QBcE?_JHn<1bIfH1}=VF2@jEdU70Qi@qhmLo8og`|U1TRx~-ZCR@+T)-fokPJ?> zVQ+VTIOwBswANeDM6HXs3oBNh6(yPha}pR z>erZ{DX&;h_X2i9k{g%}pxK08^gF%Ipf~9Ep7r-My$8Miv%SOUU~h2P+Z*=#!~XuW z-a)wA?}y{TV2@LIZx=?peKeRva1tFJ^arpP!QChvKZA#ZCOB+F>Wrjw264P8rFFe} zLL0~p>8#7IhviUt&>41mn!E=CGzkx)gZ+MV2zU4381C;6hPwy7sNd@!^w4hDkI-Z? z8KZ+f97KEl5I!3m3_~;+JnIdfd55^v_D0lA5Tmm+Wt&o0*Q=+lf!vU~y8L=r^}=G% zA5R9m`;as7;j?f!9uJ3m2jkv8I_w?pjt3C!!?3>_A;j5rFh-Le?DzU`+#62%z1_nG zZP!!xD87bEs^}V~5u%7J5ZRQnMa_EJ@-l4&z9D(7DvcmIEWFp*D_FR{J3c( zgJ-+r$=+~qa2TOyhbSB$?xOLqH`$F2_a_t78y+5v_a<->?MLBY_$=DpKY)8)7OpnG z5f{Ta!wK4y(y~@Pm5(IUh6I+-*1>Vey4&dwI|IYK&rr0xci4kHg!XnP2XL}~*q@+i z80}5ML4P>x@5Aw=AMW)LjL`nG-NW%5c(}W^>CMD$O4*bk`upaB*VJ4g zdJE`Hg|Dg61fHwr_By)-`wrp3!Tu0MFd8519>U@N!SG=CtQQ^b?e6st4)^=f;9!4n z7*2-!6EqnQhG@5Uc+i^+QE%^Hf8aGJD$Q?1>NzABM&nKCtg6)$S;K8eVO4xBB$u|m z&Oyf*4+oQj@v}p8*pK$2@$j&BINlw?{$RMjxBu+muzwhZ@L)1H-0L0g_j{A!AsS5J z-tPW*98P+ZF&eIKdo#kO$uzwIVP&-ygjH~x5>^&p3&|nuu+!^2Ge&U#V0aj!XfT9u zaCk7-h2uRGKAVi6!Qlbw?~mbd{49cl-Di7IICzG*8GHzz4F|)+-QnJ(zrN|Fbe+cO z7{&!v5Cbp)=>idgBP1LO(j-9>{0XEJ@oSRDF<(5ZCHFg3+JVB$p@dUmF2~MyW zCtv`0Yr-fJ4weP9eJD2$B6LR z6(NcVia?e|R0^UPhmejye+2{O*_6Nt0m=wuXu1?dU!?@RFv!py-Ul4Xo=Dz0Lm@$s zA+V*S<~D#y1kTbp#>w=37D1-?lEXSzy*Wo-VDFL_C`JrbK@{L6uor?991OtIBqe<6 zV9LK~{Q1-(HVFR0>V84vQcH9A3FHY}KpgX_Cu&*0HvvO)GL-yX9V6~9Jg8-WZ~>2Ng19jl_F_5VjvR@E`gwPY&HPi9-YgUTk=C$TTM}d zq}8N#x&k0AsyWPT1vY^(H8Rgo^%Sxh$SEKH8P}ozg~B`^rWoU(KdPEJK#UUmff&jy|T{$Xc-zq9WJ3GS7r`W3zZj$Au`7aqTqUlIH8M~B&Q6o3P_$%aE;jvTwMIO=B7@Iv886I z8-k-O!bt&8{B%Kz`3rtY3H~RC6ob<=0!KMZX$WIPN=t>mM3@R#e{Ic7mD4mTD)9L; zhd7aXpfWKOKUx~)3MY}6T98bI*5^g+HaRpwVE###`V}XUrD%lNtY)VyfFjq%YXH-N zH^&K{=W_t(X`V0+S(z6q0ZhSM8e%X3{SvetFz0R3 zTozy;P2y#xlz;)r6^a0)8ZX(9`k~cVVMxhUyfy2g1_~6N0G*|I9PuTYv{fVD{3}3O zl9P`ij3TYHOMpd{%IeO*xtJkm`jydQDPJO5bWBnvtO0KQDyy0g5y{aGfD#m@TI-@n zX*zo?Z5E*dsFd14;4%>e$8k;>B4=qVEp6-fPdJHiGOcATGKOJehT?^9%SIeV9rFnI zo3qSIG4PZxfR)IWXg46sO1|N$@2IMeEij^NSp2qiq65a&perC$wEPCx=uVYks`r~C zXH%&PZ#AlCxfl|EhY9~!s`LU)gtFIcO7rnQP{_&>Ddv89Yi36=^P@<^p?c0& z`=`O-B#iS&F%KN43nO33f?BQsC0xq_I#!NHv7L0Ck}J7vGFHFv6aqdgI;*zaikhC8 zS;y>7y%l^dt!VsDRV_;+vyRhCaziR^z{{8%Kvki(WEKU?sy(vE&LwP006}w3Lq!C( z%ncbVcCWpVESr2bVe+VZ!Y@uKR5@M8r*T?0tl@-YrEk~QT!<-uuOOQB#b#okjT z2O~^S$l@h{jKOfGtWT~^)M5@N43P;8#n_(42vRdYLS& z>H7wX^}_;_G!f>yS-Wt`r-*VUnUHG(w^B->j^m826~bH1pKrOPLIyde|s?k zKYsoUI%h~QMTg5N@a4;otta5v6ltm6%a!&UnEi^DXJ}&HYvnJ$x92cxo0Xe*uF!JC z|D#{OsDKu$x>qEfTR2R97+%~Jri~n(2)?|6LqJ*DLNRJXq z76O00iZ#Ttu&*OiTXm*V)b3-+I2R0)D)nImz=Wi8;mOimWbIRk8gHeGSotv8MIlFo zb5Zm{N^oUOO8(@~$A~lX3ggzXNnyxx7=s8h$OY0EfjEVcFw%^jD_}zkC?hzTzJLrW z7{@Tt>uSKVSR0&L?Q@{EhLb*+jNp`Dwgh1esdS(fu0F=m7V~E;_n>GvLs8Bb*t*^^ zuO{_1SK~{{(7c_b5o(773uld9u}jyY+}c|@ejo!?jAP6EG+^QN)ioqhJA%m+ku<06 z0+BlC=o4S;VJ2j!Fu*AiQl<3-WUfq?YGF(eyrRNu0;V~Z)&u0Erun>ZDRP0YK~g?b z^bfrt{B4F3?KVp(dn>iMWhXDwT&yLcgldJFf{)6WdBug=Z^?B437P!gq#Dj^Hz za0v*aX}mxnp>djC zQI5n?pTi<34MT}b(TdRbqJvU5@~Lf;dHE)&!r_zyn?qVnQx$@+Qa+>H~iWfhVG|%*#iTji0Sr#MC3NRKQG-Ii9$1^Sk z^@MzvoTVvygXtWyaJCuN!kt)bkz%C05}ESrUG$OEi8?QGbXD?CB_pJF2fkrb<7m7)Zc|LIxRQ!HI8G>Z6r^2 zxO#;NzzJri#14Rf&kjC+@f-oj08S`_aV&fuotFA#c6;a@w}$vy1w~kd2jp@$QgOOi z*mYWJpV*6mjwFG}QnXYQ602B_12=@Y7$-}B8Jg1$c*&b|N^6JR3@#ABT$*1e+jGg#gS%e*;y6BQQjDL zsAf5OrEMCckf8{C)RYt>u_MuxZOqa*q8g%#`_j_L3%ibUfWUmDOe+Bi#xGC|m**%< zlZcK$zo))th+v^)OYgaaOmk*F4AuJy#Bom0#f%`z5$0ctIE@J68}YiCW`1TjpYMg+ z4fIEL--O*=vfVMi`+ znFs3qlPA*EK1VR205dS-b~2d5Phwj?oq*w=cYDwK!yaE1^16bJIF=yKz!*(Z!fiP* zE2w`))lZ!LUaKW7R_Mg{xl0c*wvd7A84hQ1yBEj8=TN+H7b8DXV1Wg5L@AsivmUr6 zm@$-ebaT>9TxBK_B%F02vOcz9hP!;#AEz*C6GYRTgot*z3AyNZpO^(vyT8rXR|<<$ z&Voi@oFowr`66SMUN`SZv7w)(SU@X^lD(uuO;rLRL;yI2X(Yu;Ia+ds2gISC9 z279oohDW6}4Ar@#7@al2IX4KgaAGQ@Up${o@Fxjg>oz%bm^y@TPjq-d8ZD%DlBFgv zA;6W$0z34ED_-^0Y%HJSc^0Fs*C~v~FosEp$o3B4KYvm`ceFeDu$>d^kOrrK^cyEH2lGY-K4h=p9LG!TAhtl10^o24CcG%tJ6(nD7S62#jg!;G-VXoozTE`Y zdmNromwx94!)<8;F}^oe1$?M1RnUl;w1HYEg|&(y)AFT8Gpx}Lf);C3g9Yb?+Cfsh zRyEY92ZuQXh(w%QD(a+!jY?&?yyg91X_&?x>)Uyr2^iKHqK|xi^l?Z2d(Qv3I6hSd z;QJS+AMNULDaAjjMO6l`69Df|em)UwPP2BVvC zVh)H&-?gwMj)M7?eNkcGtqu)hiT5mhH0JSM~+nrCd$;ly$@C4q$Vy0rKc_9kc{)yFwuQbb_PaTLYZkRW>mU*S(Edc(gU@u@-?F`LqftS!rEsm2II z6MSWVxjLjW%p!v!(qaD`VRITxL6*^8Vl%Zcu?q^=FgcZAmLa~D=kWP&)pXI8iJmQL z%8#nO;xM2YNhjFA;9AVYEgc83?V!VPOmha%r!1u=@=>*plBk_irH3bF+A0~==CdCs z?J=Y{bmOLV+y4?&pWAGug9Erp@(gqCcYGt zRHFV%O2t`Efs`9xpf$7zFSjf%c}P}h__hj1?Zjry>P0GpY*rw}0TlKx|5U7a3d~L+ zn{_}llz`c_=sNGD_gLtPh}+BDq_pyXg1|MKJ0^McFZyqp>t-x$kk~fA`DN&&VUgzKpdhyMua*0 zelGi)g9AP$E*rQR=M~C0g;$u~?^R@=I*|txTdeRtAQ?!<)ttnh!x85}xsrW<{u79h zJi2i!JKn;!YRk(OYEAiOJ-sjFO09b_G_m;&RvK2>n=UmZh#yt7e*Id*WHR9F6`Jtf zHR}z7pl`)tYRdz5r6Zs}7R2TU6Ot9&vWeVs!f9ct`#D%jpj1h#i3D z8C$-GXBcl}LxDp)F&m5lgE<9v?vip|}O*95kYgnaD&g`;zsPA=IDUCQcz z{kWrws$&|wMiJPu(AeGqN$OM;MyLot5*xvMvdmKBpYWkC8?j-?#Z%knZ55An4P~MQf^u;( z37}7y3YH9Gi03=SD60S@^PSH$XH8=5DCt7S9ENCondYP|Kw3DwS1!XaP5z-TSr9IZ zj}Cy39V?3k1T-JFWjI$tH6NOlKvc|7?SmJQ`ss6y zd@5y-z&T=w=v5eJMJH9(4j+j$L&?jZ&h@z`ZsqZRE46=8Vd4$6*EuH?G()uBdv@pepGbcENwoe!QtTs`AjtTrPgNosMUNdJ zSVO4u8qs1W6aQ0+jky2^RBzM}6jMXxA_PxBUrvzkf;AS9#OajYkT({Pbb0kh?s#DC zkg^)hvs7Geq-e8pqM_@F@Y#XhIoExadMvPdt9{B^F^?P9wJ zJSiO5Bl8Mq-<))*>C%I8DU$%9ko*KT=+iOi&OP6)GT0u8xO zpweQgVG{M_hqtO*MZT~{{;lUf;dCim0d% zQ6_9t5NU4vk}ZNd!sFoJz$@+4aLIk*>S&4gMck9fGni9E%nlha(L?iPdrHzg>&};L zQ^d=l$%HoG&SXLxvSu=&x93Zl{j0dZpfBzdUQd17g5w=Ccl{M-!D%{2{O{nA&sT`D zH5)qCrA__~M0kNCk$(}>D}4)!$bdu{OhVLYNgT!2kWM2?RSruLhau8Y z+71T(R=l*gI09#nBM{%^zJyp|KY0S)5g<0jK#VD~u6f{V^gOGyV!bw-Ol*eE<=-2$ zKlmBTU(OC*I72XNt9NY?xT>iBmP-)1zr+b1rU_*PVvzuUBZEh#bHvHCjTSPrqzfs< z(?p~_O40~*pCsa%h%+%u3n!VYdgDZTO;FRVwP6yqVZv}* zzu9i-zdT5?G)v=jx;)P~QyMz!c+Cz!fwwjg)dl^R?Vjj3GrPm`hpsC}9N4w_U`-u8h&-)XFk0IZsY? zaIY*>qzk=+B#tnO+6sX-O9c-i7PbWrZ7%V|pKT~H?{2rOewcB^nU#{c-|6>yQVJMM zr6g;EK!<6D={(TyuCK2<&U-f#q)t_!H)Sd4%B!zvO@h8o%VakgwZIeb8v;4a#Wg#Ap z6NU)*v7qsf;xRf3w3E3*LgCjzKo*aR@?#+81w$O#RZfq^`i_|FV=Gs(IXEq|f9iZnGICk_ld}X+9H9_e7m!(gUa>}V9K31?$a^KP zJ)Fo(5>14lz*sFZ7mi!bT=Dk}BkTkbgHjkVN*0CJuzIB&sKf#n7m`E*^J>htT0ILE zADc-mmvyrAD;%4%IMp3~@1EX`wndzMy+xMr|L<@V)Yl{xt68V*JKtT{e1D;`!@%hk zv^>f|30{wSu&?fyVp-^G85$@f>%Tp;&A0oG7|`GjUvxD_>5DPaf78GBeD@^G&G=4}*(ieC#Tr(%d4-mM!7D^LABEhA)5(Rb)@5sD9A4^hb>%=-Gm^jY_eN$= zmsUOcl!>cqu=Y4-@%I+v@$w#Zy#wPO`{^5kA} z*a*M`O-A5ubJ#cy*guM#Heh$Z-#d_eU?pg&@Ihh{ifq6L#gc!1mfnH#Cb3&>I;=ruGAxL>7sC22o+BIJY5k z4tsz0ns@tkdWFRY&K+(9(uGM0A(&@sj(tiKK-F?#t6s#ZKGkP3J}4`PSLpt^!wYzq z?5g9|EjYc+CPso7ou%>^rJfih%{dQ<*NM5TO5EvmjoC~X9j9q@XOlzYuxfG`Jnv&6 zVSwM|>@YxYG&@Y~dv-HCdD2pOz-h6`DAS;eGj!Z6lWlSoCc;^rFrAVqLK#Z9(S{M_ zpwz7_DP>#({T>$umX%vtY7VWNx||y-0#BbFH1=0C4hf2ApqV~&@3ay*$6x{wq)R34 z1!E;CL+UK``?J^Q>OyKuC-5 zs@SY!s_+AMElsBBjk+c)Htd=#{7_x{)8pfRq`K>x%cQzui>!NDy*RkTviN3g^m@JC z{@$MWx7X{H|Lq;@_W#u18w>}%-Q8ZV|EJ!d*BkEt3H0u|v%V*%43adK|rtABYPV3Lz zFJD@pKbsh|fQ22&fgQ00+o`f$0NSb!o&eDKAnl-OoQ`4K!Jm%#ic4Q3s0tF8Oc8jB zlL&p<0Z*|&boAU*#-CnRnsIKT1{_km-EP4Qt3}rc1XqW&6DGJ5CgFrH8W;Vbb%m2? z1k^s%k+{8^8zwJI{@d0ZF(@Okbf7c-)c*V#JT2cvEM5wndF%SN5|u_s++M7D^5x5q zqMIm*bdO7aa*8z^|GN3ljb0eve9qg?n)$zXaB$$x|Nd~ecknp>AL3ax86^)m6R?;< zzKLfQkacT6bd-gl3p`aRYxSn{=()(Ftt*);EN~)rer;T1JnrNS$GT8QfeJupy9{3V z!xZdNlO4ItYt{lUTC}qj;gEqqE-`{K;O%Wgz^6Ew65hU?=7yL$ZSWOZ(#qREq=(#s zBDN7n&q44sNh5TLv!Ljw>fqkquGM$xcobEHug@wE*-X6e7VlKUB~W@CWgouqg`WM! z9#Fn?a^&!obYw)@7wtsTOu=7YWO4C*lKUF6(6;yo)WURr`enNun#w}+Q8Q0fmRvcVXK8xHA*xHWgGE08!LdG56WHwrMU9~77fKje zW+^u`c*m~MSom#FwQE*MLoK`db8opaA*%vO^;$>>3$i^Kp0BE-8&NFjp^rUhwv-5{ z7VC&Sdv=euZ7wMxbOSgm*b7ep`d!V1@=UP4mjtJ{-!9PG4S|ELLerMN9kYQ^MrVB^ z_9n;rhBAL6zGh^3EhvLuE-p?>5}**HN{R-a$?HlN2Qhoxs?w9i)a_2GF&eBKJUx0a ziNIEwOT}<*gDvmaT1-)rx*i};E25xgG6`vC(LjkrA7Js#1DKoNj{UvpD{I@x6_0H# zfws)Hjlcl-bh`K+fDZTrBzz7f4D9iSHN0ZGj;jYV9->on$H%CRKfv#K%G99CO+itI z54HPEc&f!W-fQQZ^i+Jdgz^uIQMdcUV)Vn}hecqaARCq7C7^8^)as={d6iIO|A&aM z?j`@P^w`{LA+W~&AM_7)OZNZ4;9&4*|3AdD%KqoW-;uEbauFbPwUrNAn6j0*B~KPi z@;K&y@j2GEMa4VeGEh>0xA99FM~H|*Ml8-C{S__i3kP=o#6ZJSoxig>I`hS5_ zsIHNY-3B+3_@|)0xXC#UwynhZbHXRZFfh2LL4 zYxMu_V1K`)|Mz$MyN~++As*rXKSPXQv_K+cttT?jo+Q~g6yxGWFtzq#VF2S!SB5&W4t1JiIQEN$@35f=m&cANu^DX>xv z6*OK)yCSajhQzb<-8V@Pi8>La^-LGwL?$4b75Azb`-p-uq$tu6z48_a zB|TP2QqfkYU^wsYv*b~$l-YgMev0m&!I8Muv2tplh=x^Br$tu$;*>oQ7%GQHQN!=< zDx=&n732z^tCIhQ^VoH8SzsOKm9ZGC&Q|dYM5Aq+P8EQTs#8QcQRp*sxsExSqfZ)$ z)Wi+})N!GPy)S{)?!Thr3Y^DfXSqXqD>`9~tg2TefG)zv-9c0(HtoX)li_gXSSskN z2hzSRD3C2&p(1=hv2dXMSAof=6o8=3UoSKMTApbRK(MfIQy6ToqFPj)3_7mDqSVT1 zrUM|{>1M`IeEd+DJ?r4q5Ud2LaXUb zMW{CyEa$S_jL$z=*>u=0apxk`(Ld|?TL$=89|W51YHZ8pP7#jd(n&?UwB1c)L)0y` zZ_i7qK$70J#i5F0WnT^@M-ySZDdad>O4M$lw%w`4UK&r+FNorZEoXu2x;0%oG!W*VXfa&RIeA z^JkLg8UKxv#mJ62SEtKX>lt0hR`W24Ol_gfieK`iw6%YW8PY+u7`^ z#wkr8jzMrL_A*T>I1ad595c7lWB5)6)`lplzeEbDl{6^@@L%nKrwi#ntMvWK)8WPX zFc@{NUqf=v+Z#ST)ge4LH56p9k8|E%=JF^yR}Y$(6z2~F1~px3gP`3O#sL5GR;UK5 zrCI<*0uJzp$(vvW42yB~nPgU;TPvxD+V^Gz&qdIe{Yk}Z=|$i`j(lk-@dTt~1-?_v ziUnNLax!B^)6#0i>~N)7(FwM+li`vyW!(;?v#v~#Ay!6>C&GykKzqqau&bzu?oz{-d{x0bFDM^#>LEueUqwJ=%W{@fiD0=a>ww#E^2_ zsj>cK*2T@NzluAs{QzRzb9}E+e3x%`zZ%W>n11JF1g`BDFT-KUZKSJxHam;CSVRptM|&R-47@A}nWeU4xKZH?R4E!M>8>(+2x zz8m{|0SI9R$2i6eBPAVS6cxF8-@d%KJbLlw6p8tH1r!M}_ z&T{#{!GF5xRiS^DY*-ce=gEP2w^4sSO?S^Re+79~M*KB2#_Q(4&ig9tKY8Enz1e?z z!$Eoe@9jO>e-H8)`_Im$Ji*h=eZCq%$1u#Q32aJRd4p-A`yxmDjIr!879pRPGA+cj-l0y~JtbM_ew1H?#f#MiTl|^e7|E`7 z**xo-@5QY|b+(8>F;1_rwu-_Sqr{{^)>$Vy-b_RQ(2&3kDH&k-xV@X$R(n&E&ZG_g zk&Z9TSUKh>5O=EK(1p+I$Y4PyS$bPsq7lzhTBMk_UGMVwM>_Vk!=KB`46@nfrCM>Q z93_D_hs(c>7o(BD;sbry$S9CqB)}y#B0bQKV_N z^;*At%(H;x^tE`s@nO%hi{egBeVVQ;?(3*$N#)=BfzOQ=uaRbCU`>$7?|NZ^J z@X`PCAWxnB_u=&IS1|n+S>jlIyiA0t(vu|{P;lomL#~2Gzk?vnP$EFBu2Jj!m&g=Q zfZsYX?OkJnra2^Qaa_})4ad`FC55Zk+*o9ZHZ(lQ6qnjt2~z)k+})2)=~*TJ)dc8X zO76V3_5YwZEZcvB!K3~6AWxnA*T;e6&;zXmpvhWNT2IHAGLTNZ>*^LvB2g21P8V?* zDxJ?0+-P&bh-LqhKh@`$?rFuZnt#9rzv=MC>wS9r#7?@q^sbXRJ?ffo;%OxR?>Ya+ z!Tv!x|3`oKG5_C#JeBjGcd-5I5s}62ulnfQ{8gXU?EN~Wnr!_#6>gX8V}rnN{pS3? z&oAG+d-4AD%MEsoIrYBJ4P(wicePinsBr(=#5J1?y!|U2$LH6Wg)_IcS0`sLe>-~p z+HNg)_cpMKoV|O0@$$0ol;|G}I{p1luhZ-H2SE$C_vFd@N+mICnBtR+$5S_s(#w<6 z#h#0qZ1(eKVR5MoMF&2*)C{>95y)lPE1`2^;_rKizh9z$|0dM0=hBo|cYImsX|bDAL=t&#-^y|sr1Ux^ zk)#Yt7OzM;m$3@cf;&SKE!j5q$!alg;a?4jumT_KP@Te?(V;U)P}DI6H6_(;{o?Bi zX0^N>&M+AtNhSV*+dH~ulVAs4HpUB-AWBb3Iu;E%FPg?XwAZw9KhYG8?7#cX|IynY zRQCV(29NiDKge@G`9I35#`aAUax@S(Pi=9tL1g#Sy2$Pir*AKh-e3GuxsFdLmnMR@ znb0+NC4J4+@T&Q5+|jr60Ir??2bKNb;qGJphX;A;{C~gcvA+`!pb{Bt<%YEZ;`iJ}j<0X~9z1+jw;P}7x}))LIR9_u0b1+-=~wQ5*xP-~|Meh`(f`HF zx&sf8cj^>AAoJPh1u`Gk_<>60ns|arRW|Vj4fhXA-XQtr*8ZSkQF8wB^yuv9;@z3! zG5Am0rEqe3arD#cm*F4az6zWjg3uiw9T`Qq)%i{IXz{d#_Ra{6Jf!cJBA zCEEY%`>Yz$Zofpk##C9)%-@9{2eHtyU#_RUe;bd^W>3Zb6L&jwFMml1{wLSn@o5?z z9Ac*cQUJj?&XJH*Li^4PQ-Cau05og? zQgO=%1#AWxfCPb%AjnYE$|+8!YQe}k4a9g%AX%<7BIW%evkcl7hCG#L!Z*5izNpOK zZhU3EsyoY|u3EsczFQYP>bqYuSPB!=_u2a|M6u8CJ2!r6K-Lv9sl_nO!3w znz~I&UT%5vnxeG}!Ezkwx{OslfP2&-m0{#Dj`O2Xj6Jp!t?m_{dafV|pl)o)a`Q$uaI`=KPLb7!hg$2f`0S>= z@b=^lnx|xWmz|jlh&Sm^16-Qf33dAa_E~?5XPy4GZ4lm2hr8z&Z>`Cz$05G~eeTkxs@2`^H`DD+vpAI+Ghk&B zgE=BoR9u-YwYQ~@A{?@9uQT7?@6%rY?QO?Skn62123y6dYrDEZSW*+U$iXB@nUKoO zFtp11(X3@B-=p7vYTciK`{k{EO zS^xJR^FKYzv$6g^QFq1Oi}p8Hir$g#SMWB}{PuOYx7PdRyLG<-t#4DMs`Kry4K%)m z;M0uYIV8(-b;a-KIha~I;QHoYuad^&PR?*#+*T(+l{Va;!kneAadLH!O(=b>T3E$8 z;C^K25HGN4kCuI&7;vGYLvf_sF_+@5`CbO~+}iuXpV~igZm0vYU9n<~ zQox^3^ae*!jIJS(;ydu8Cey6EDp$}#wiN$e0xYJ!0#s?!k?6cd8SZVp_8|J)+56i8 zVmkkqn9-H8W!hD+3$F4pA_-!Mh9n9Kr(t=2y&*aVmD@I4tdZRHQfV0Hbt70FmbrIC z<{J*iyxBO+R}I1Z7SykAzn1VDG*_j0NuYX$Ur5Wj^TJ51b@cLcY!#NF1s|1FlW0YQ z)YsT{rN3q0gFk}UD+r5fN)$?`g)(<*To$&de|U#Qb%WUFrl>d%0!AR3;49Phg0DI_ z?UFQS;yPwVmRX7uMgzwIU3{>w1HMLM5kRFQahf(`jks#Y=7CDY(8Ks!ZscIm`$l#w zmC?wn^PS|5yCPQ8ip7xvsRkpk?V2Yi$W27(A2B31&SxI!-|0}Iv0w$)CR0aY56e7X`e`8NO zXGjE}bj_ z1rj*_>;qfD41h5VuTT<=oR{m7kk=Ssd%IFUh33V4^OE2&`|L^{wbpK!fV0Zs9|L=o5 z!vFh|XZJ`4zyt5?STulMjOzRCpPJM;58+`6H+*Qt9qKHnh$61dl*f^PXt`5aAV9~ExT2;~bRu@>`*FLabretY! zj$#zDl#HrN2ZOL%43t8vy$YnpZU+?5y<<_4 zIcCK#cd$fB`L};DVwdByr*d5sOMxSes1U>xXmNpbWM|{bhhj~Dv!CKLysG`s32{W+ zuL9z8aWO`*SW?9cQ+3lcDA<7)vQoivmnO9V5I~Q$OpeXA{97>lA83Z zk+F^Wia03%t%2eZVEuswyGr_X=-Gs*;Ankpil_~5b8K(GI<~NH#57igD!WuZx{Ols z3?T#U z*|1-0HZ)XRI`+bLvien*Q?e}#uZs5KFCX>SqyBo-UyY^DqyBo-U*EI-dPw#4`KzRW zs`LM5i||fjfB)1V|4aX%eEw&++j~6!`ykK8@xQ0~R6mpV{v5{;&+jK1I9r6pZ6F@c zt$po9yGQ`B+G$(kvMs{`weDJX&N|cgX|@PAc46O*gI7V}ifzks7C9w@c2Ek0)c97t z!1~L|Cd+gvdShbdQsV3hms<4~E1(rVWiQ*6&l&kW$+|h4PAM^M6T~1+fX``L?{u}g zsOl@S1~U}TJ9O67XFl6%t78PN5XxE}RsL}PH-Z^@mxL$~Ng1t;dnYFc5SJYxDQDau+lR0!W8)hGg`1QlomD^`OS6S>2o8bZ65JsKhv4q+ zF2Nx<1lhQ|y9IZ53Blb01b265BYQ6A{%`X*-96LYRkglVMbQ6X*r8UjT|_>AFLB}v z{c@OL?s6K(dn+-!PNu)8q7FHCpz58*MlO1oBhI4zb8acO;{6I`M`sGKOg?3=1? z1RT8fgKn$dgUD5))brk;py3xXvc2VhKq<>(Ctg^dufYJxKj+2csDs69w}S2J^Y*#@ z@J)XS%Y-7E`Q=g#hqM#Rg%nby@i0r9<{dL>OEEnB|6n9f`K#L}yVt*`ATRV2=o{b) zsN4gVeY=2Tk=&U3-l+^HB?Nz{9_OWLL2S<~lHQxyKQZnvx_Q;G;YLp5(;|JPv(8@CjN6w71FuT3g257ea>NI$?_R$gQy_K$CZZOKfYT=W>XjU(%#P4iR#wxg= zq)r4*AN=@}Dt4_XshS#UeTF{8h2+=X#`BHa@>+{*a4CqKMzDY*`?F#*ff+$HuMNwW z*=$vZS2yHedB&(om{>uuWT`x)9yf5en#y4c9c;1lr!Dfp=FlX4jIZSjC>ti+S0zvL{hHGzDn`Ze-&lNTRkrEkGPKt$VOn7 z`T!q7_;=O=Jt`|P(#c)W3vo@&OCw7?^npZy zhNn+ngRa~4an%=B6E?-msylzbv?JlF-@VcBz{!7UPxBstdlHxG9c}7Gyhtj zofl;Wtv`LHt;0whHFV4hDt3;h_q5M|?xP|*`bU7YH&l|9ldsm*)cCyWVZ&QZP<-i! zlQ6C?+z}E?j~PC)pBZ=9Y{VL?R4t(P{D!1YoY&%$FfI{McuQ(NuA|h2navf6y!c_8 z!M7z?=A15~)tV|%q;85(>X(bzQCcWxJkopDzfzyNl zS@KI+s|#$+GH`l{F$U=k+BSP#>K7ma18X@i-Vtyv;EUDp55KYufqjI}YYT>^@CU68 zrP>~}_}!B!#ulx)=y>I`mmaR*w58yNRYy-jW3kJbrTJ1^FxjpXceco%jx^0_hhnJ3 zQJ~LI0&@ADko%b~rC$ePDsGxwnWIH9mR3D&2-Cm=tvbx#3`HfH++>TmA@hF!0ftym zT4FN?%Sj#Xi|-pfRe5(nDeWh-yH{gk-3SCSoHn}I2Da)3ib{PN%T{$ltxR{oC+VyS^| zMBNcsNHyEv7!i)!-`A{gEuOSbO91)B5nPoBDCVB&(fPaGfIJ@anE;HRap3noCgCG* z?7Z!jt)S%CD-0978JwzhwFKR9Rp!Ws&xsa1haQ=gmiXbn8gtI|Svo5d3up#=y|n#V z0#ja1QDjsG?p8#oo zr2x~_g?LS=?eMqh%6NQAgd9y@dIYM`SWCJtcB%sTme#d&x~G!ccnh|v^d`6DV0=fg4%eik0}EnIGC5Nu+ej1Uv4H)M>8@+M_VgQ-9&FV zlX<)i*#i9|kA#YMmn%kAHlEJ-=_jcNuU{#Zg_)eQIo08snGl++xpU7F_9lB)-k7}7 z)HJ3rqh`K$1TNxoOR3$($eT;>wNVx#H@ETfw%Na7+{y%agvCMf5WNQM{J``MU{1d<5xxgOT z3HsqA7`k|^e>MA=rnQ4R+2-r$F_s>Z=mU(+UtFY!wV<{3J7g2E50BAn4h0E1e^sWP zF0?Gw;KK~sb8*9cH~qHa&=s%^wH#Y1HXiYXng+t2g0Ln#=sYfaxy!Uuj2UQF%5cuf7 z#r{u!<|sBr!pB-Ft+*@blz*2$`24C7MB7Bk9iH<=AGEW&lCoX{o89K!fJ@4CeSGj~ zKGfgl8*OSMJ*9Q1bQj#`y|sdN3ENo?6RLOb1940TSj8{6EU6j8zY4#wj*Z?Dhy*wA z7)+_uJ6^Pf7^(|`+$k$hp~X0qK1SMXMb;i#nbjqWgwl91LA{XYRl*4VbHDyD@a5m! z#}oT8C^!`SU8LmIwdVi_L^pgem236bff$i=%c~IiQ8M=rZfxrVSj!sBz#c6FZ3zLxL`|suP@)V`FSjj$hm!roM^v5c{U5bk zw#-U=`O9W(X-?SP6IX)sP*n%*=AH6r9PbSK`H1-+x7+bqUd57mX8bk{&jao0?yv+7 zQwxXZw(@HMMbrwzlThA!=6A*OpTobQZvRL6yhQ(FOt@bjGF<|4Y7fZ6;VkrGE>d4L zD)vUPe6wh}WStJ=J@$Qoo3s7dsBsTRBj9m=xznTg8vR+M(%EyrG38^o6<6?=XYieG zb3`kdqG2|%!TZDtfsgOU$MIN&vWa^ISeqNAozyw@^;foqy`0={w)dC!uV;^Em1t{~ zSQHuJjfuT~aQ$F`lrGO0yehecS9E;US+g(NpAUH%oa^T?3Ggl|JKLu`dL;gc697ex zB0pz7#n}ggjXGQ}=!I!ECd>!zlCEL^D?DCVJum9IR$?=vbLOELr8hEdQnIbfGS+~o zgBuT~hw03smOWO}ClL}qr@9XCm6&UXU+KD~O0HYol8|M1s1rc1!RjEr(e>=9%pJq| z)How{aL&#VCv$kA;$6nn+CCUp%2>}xljQj5y>QGujlmhC+~7HxvA_paXw;s{U?h7q zmuNf5iij3vxxSO@kW8M86EMAoJJqnIesMX28sgc2gXT^hE+gyjXoyf5P63e|-AU=- zsop_A|6t0BLjPCO3r=H21-xc#q5YL+k*ABjwS_)gc$i}ymB?fx1IA`cfZ$@m9Ki?v zz3#=$=8{>rx!7!)rn5eiX%X&HvW^#^#WW|O;)N56C1B)4F+?<`1(kRVY!-Q$_N(2l zLafk_@X!{}4hjFt@JafuDM&6}yyC+_~nhj=(FRcjPTFN+y~D&e06 z_pab=sO%~ly{vW&z?3o575;gZ0>>a2n_J2MX+W~F&85K9r44L(w)%-lcsgLh*sQyv zkb;5lQ7zr%r!GUWrinu0XMv6YU_G}PvdI+VKm^k?1gsLFGamLnzis~l9zT;F1NH_J zm?Lx29WGz`tsDLTtJa)uP?px}-uM$wmKF`#pR2|$Bh^_deWVx8Ru|rm7u-X*%RMJ` zD>^h&nSXw>%c8ijjoVTej{RKBXH|dWtOmkEv!oj{6PGV>e;F*9`A%=)XwfCeYVu}x z(YBY;lu`*e_=j0oNPb}UaX$##ee#HGbJtTaV&Y-AU15}`dqHblW^FJZWvVRSnshS_ zc@vM|3tW=<>Qz+pEWuVOKX(Y0#iH7lxADDQJiV-Kp)M=%J$A_BtylZL+w|CQq;X|In=Wc6J=ETKMN}FwQZy|;+bq#-e1@D1x2GA28e^^ zR*4t#ByvuoO4wt@#QZFBp>(Ilw|$VJjZflQ+JL#QDx4eSHCt zW$Mo3CQ~6xM_W{j=}NO0F8-+p_Z3Hh)9^3xAbv%5`QkLc{%0EN;HhfyxQ9!AI|N-` z_xnu`q}*a1!qWMDFGAeL49gST*x`B2Y=0ThOmyRsqhVc;tukm-IP8oJBGTmR zEBDqO$z##jmoX?<6_=5!)(Rs$X)_Xkw|T7Vim!K3aMTc`jfz`bO!n^BF;Lv=qeU)M zPsih!hI8_aN;sLNqSmZ9MgPZ6{Tst|_!(|50M)B%VpV_v=10mR_i@HsL}RtjYNnzC z_Q|wE&sm51a6S$dD^p8!NJ%>&SW;@BkA_~yjCfJtfiM1322Kp?2dECcqFn($2#r({y{(Qd-n zCB?UFh5PUa@l3tY5{gf=k##y)^;Qf{wl6ph8PR-fM0eD)6?frBDf2KCIBKDZnC((m z;`niN4turFG6`a78i=l~ds#wIa?>Gq`$KzOK5+Gg{jvt{I;xBNuqCE@D3{dl@Uc_d z$Yw{w1d1~eJd`5Jsj3sIeoix~C=57+Jx>cIC*n~L#ZUbq9$pY%V1+mWH`f&-S3zi8o(}D| z0@G^uZWc9b)du3>dpQRJE-2(WGXF3#$ZIWbjkQJpMDF_cwPEiltnrTTIJD7=khd)I zG2a)#)8*azgAh(a!qDy+RMRa%ilLMR8g5RcH?gOp3Y68vhZwR zYQ$C)4a~>?SS34>&r_MD=g(q2Vmi}<@Nq?DpU>s#n7uSy-_YeLT#yX?0U<1GD^3W< zPFz~{X@(uer*6{Ajzl^KF;bB10nzsJ;_UW*r&e{Q|4@TM{m-3dTZb*E->9=A{L5?5 zSb5fh?m`uK@cyz98jSxC7d11nqnHwYRJxWS|GpfbeyA2iTLc|HrRw}%tODFI+$+JG zh=}iEhcM3~Kq z6d`xcr!8OSDoP*3*8jBj)-QHgj^+I}v%rW#aWv>^Y3)|bDGj`Nt}#50vN;`(NTI=& z*kI722Uc}<#++L5S{sxHZ*^^^927w4Ft%?CuqlxYGs;()F5!lp1P95*x6Yw7e^)HqKk^zo?$BLWdct0{2t$n8S9x{4D z-(P~B(Za_g|NCu_6Vs-g`T6&sGXb<(%|}yenVc`J*^9Z0sA$1SdTzhHe&Vw5H=creh{+VKNfdhVJ<3q38C6rO*1-j!}dw zJfFl)&a(GZ1ha>1^^$Un?`1I2^x^ne6@wTEI5(iP_*Z^StP}6*fTSY~G*B*Q2`8+7 zwniv5b(HzU)N3DXl4H!wct3rr#>PjFR{6#ICk&IQWu=T_)-L`IIONknkJH}$ST4CG zPHW^j6=(kHzF$;lkeH@W?m{j1j6_^+`sJQ=8E|+mo@+(kGlfil{pH& zA~caLO`|pNdDX|KXi$wd42HExZn~fEkRuEjkU-5jh|V znvDHm$2Hx+t=d7Zv280Nr?d)0^8fH7YBwUHEr88_sU>vUn0YSjXzWbPBvZQ7U<7cTLdw$2OBG#eN~_{n z5dI&RK9J+^T>Y_ZSJ#iLj5qR!;Wgf;0(Jy_ayf)%56Y!x;cKB;TY=$})l}b@^gliB z14;&qX_lkE%Q4JUa1>Y5ut%u{fT7Nt`l2WVf@&#k|gy9tvC* z)vG$^gevr@xQI~wcyeq(C|>p&sA+UC+2M8z zgiaEEVea=gE(X6FkJR#3x*V{&iM10(GmYe~#~q#;)TD=45qo?l9b=~yV+~(j!Q-7S zwEI`^jxFgVaE6S+jjo2HlR%S&=XW}Zf^v#|wVGvKDK|V!)&VlDAxBA8Q)R}UWOL?ai zqMyq~OeB6N_w0@Oi&s&Y|1byfT<7Yp@!N_K%*<4k$CS3u2jS2p`X?jUYaz%ki@z#@ zjv_EG9HT017R=5zb6LnC(zA-DNaLvHE{iGgp|Z1c{wu(p005Y@k=#qrr>~%X5s7!z zKIz+g)x~qKcPc^#8V-&|g%44eJ)D`Ynv8A!;PV1r?|}|gI+8@X%DEu+p}#{u5v1Va zmhMkZiN5lUM1@lu(~1z&*y8{^axhzZmQ|{Ir-r_uAWW3sDY8o+Mbb?3L3rQ0ml}0s zSIZ)@QAKAH&y~f>-H6$2y;U|=({F2*xUrIBjobj^Sqx!vCnTR%0eG%_;pzL**(V&; z3YgtHIhL5Ur3R^$UUL)WfpL22>Ap|Ook0@y=(Uc@Y!#GHt6Las8=FzeNKDElZ#2J& zE%pMm9n`BjxcX-UcAJ(kwc(|hZF2Uy;6H%Hv3Yej4qVvIz%skcd*{^%OmsnsGn3f* zoArg9Mha5B2UMC(Y$_VP!@nFJ!v>GS20?FiR+XBPot@pj^{0lpW+$7EI9Oha3ZKsv zmojx($%D+Kv1WFSjx7{-sES>`G6Af`*8(v!F1TTkEp3z_R=E$m4OPJ%n3gc}KQmge z9Y`i7``#!C!>FZqaNoXZ#$qd)VPLGGrFiPun<#6aC}gP$a2loRd93j;TK?VmA=aZ58AK5o_wVtSQYw zNO}m3S#Uj@B0`<_`a~JJ*3wfrvWe;|NN@1>QchpT)4p!%Su>C3R47C07V`cn$i7PT zK6(N`zrf@xC=vEz3OF?Xeh&uJq4NMGKiz#m?X_bCu*7?R@_u|c^mvy5j<#@J1Lc}V z#0JD~uC9tU;)GF!FPD-Xau+vw0Pybrk9aS}2I|XqO z@}D{^E9NxT^dW85HS;;H=d>PqEcx1h=++^#@p1QH)r2(byL&uyXamQ#z7A(l`iH>k zxyCCf=uPTBjbqF!XmC)`;{c{=4Y&E4q1GSMzXEYK@Y0FmlabaFR+MO^LBzgu2=_I= z^KW`7y{*YGLZn`zk&?7@Y`9<4R=tRZ?`EfjzBl_QR?`DJVrb`StbjFm?l%aTTldQM zWwvL@k`fFOL);<+_ihUPV;luUKu`Fe}3A7kK8y+5POFHlE$#p2^XxdvLk z6U+vselj=&)Q~trN+A01i}O!}O9p5ixK{f^+)$_eFGH~+VqYB-Iv}+Vs5R%M4)+Kb zeK0NEkfsgv_f+K+vTO5t-A|H}>eZ2#Ma4N;?F@u#d$S7^4?EfW=ikG%Gil9=Z7DEs z4gw(x8DSGA`D)w(O?`!@fpO`-k0?6&e)<9BJZ78QKw_;VrlYyP1G-y9%#AS= zjnJFp1VT+(`SBRLBwIIpwhHuu+K?k~6doVTK-CTv1{@CS)HDs!p%JHLm{D+-bL zeCZXZdD7cBu1^u&+=ee9-Q0_GYmz*M234ks!0Rh4a!Z%P6Eu{VP7LlKv})Kbk#x}g zErv|wKu+Lu!MEu{@Vyq>&$uR{>wjX{CCW*6IQj!C(}ks_DRO*!`$s!&1laxkr$uRS zp6%_L!dIWR7cz5US_cYami7BNx=!ub@$-DR;IS8FQ~ucsWuX4S?cIzlTB2LuE0+M} z6WFKscPbbOy4YP}{1&#$QsRsYx^Wvj!ppBna&G#$FumwwUbN|_kE5o(&j|i=jHJy$ z$f;kc{}m(qD-D&pi_-*zL~YI10UMjphn+ktc!2KRhBF_7BV@CY^Ho(RPxbQa=9O+a zj&HtK@rk=jiAuui4lfDyyfc*KVASg>GKucTjcPIF;%1?7mZ4mGmuB2{>zW5py%0CN ztV&Aj!x$IDuZbS5fp}bO@~;Ppa=CtvR`&*#YiZ1C0ob}Gyq}7ody_?(kTS9Xi)PsC zmzs)6EB-EW$I5Dk`G)g7V?U* zx-n|MU@{Ve#m$>v5O@3bp-mQ1`e#)J)=yiQK6Gu`>wUt$-fpq*Smv+V^n2_8EBdRT zbT3SGzVuWsyM24qKP9ouuexZ7^{$>&wEd^|*j`O4kA*dIA%!sux7S_qc?Es5G~})o zAUp$+#&~P30#TnHdlhIUA+7xPmXKd>?`nSj7o*K<*BIeMc39~FTi8+Z6U|0_(N_@c zmAd{Z+ZL#YCK&y0b#IAMR?;u$6_P`7d+RfAr z_jFxbn0#lh&Xl54DAh`#a&Ju-sBoY?)u%pmS!jj@QKPBal$o;Hr(CCt^P|ph>vZY! zUrM}j&Wr+-ecs71xzI3%zi_9lI+6~<{i6)8IK*WlVWd?&ky{90QoLkUhzswWi6jb5 z5PoEc@xVHG(kx(o6F`QGojZt z9`se9-gIMR)XcOJmJlXhDE;9ULc1}l*vQj|@F&$D19{Jl!>{jK0^bM#+ADz`p^Fy# zt`@~P*EF!tpvv6jY@`5<(_AIGBA@)@LdF!ckcxueDX$^XsiSkq!K8fxh70i-{^=PaqfgHq-yuOB2*CDx0cGdJ7M= z2LrW3SXEM)PuYcEKloMERx)r#;hfb1YBA&q&SJ>dG4mxD%LT4S{mBhY9b#_SR(4fE z&iXQFPlH9AaUa=+{Z%!@Te&5s47J@x#2dF% z)dns_ax2hiv{ABLN3V$PsRysX6xLf0XK#Lr)AcrXxq$tRXKV#?5T2(HmW$S2Y67Q| z+lHv+@pIdo->W_*WMmw8{KotQ3Y{Y&&Q~e}vLK-8>!Axu02Dqv1nd`iU_smDa7YI* zUXS{TeP2)~&}!iKa|i;q}8iHnL*b_X`daFn@sxUz-bJ$}UW!XUL6$UC*32Bri3 z?REumw;rxRwW`2yjy&0$5XQ~fHsCzx9S%*GHtuIl-fPEI0G*1=5xB3800{L6m_U zf=;AUm*4Y9gBIFhKYcc_caQ`$OlWG6Fmd{Epe4wOOpC#Q%T?N0UJyVC#rdOl3xPy4 z(%l`K#b#oR!~vVCD}+Vx$sckdDuxN6W4HiY?*Pd~UAgD)m8genpxz5;<c-`KM!b`)P1=qq9IzcQ3w#FBxwd+ zk7OwCr{1q_3J@We;aw@n`(8y0Aq%6Mgu?mK>R=Nd zB7aGg{3`EM0vafn)3?WsD!6V?G&GMcF5)pnE0Qt!t}{!e>Zs0_QnP{A95$wq8>@bi zN;d$~-h6H>%bBYK98Cy!J>4FWwtS!SzCOsmIX-9uZzj3uFMw1%DU^OZbBYWjeFQ~r z7mSuSmtRk&d6I3LjWpn;fVAE?YzuvILaGFCxCjXb;#ALsIXV#s_OZPk3iSiG`@?o< z-J^G|zn912ENhJnx_&w#8{+xGelDaC+CQ%Ch52?YZU|3t@ya6r^FgV_yp1|&0A~x; zoP+wBVI=_P%MF1VGBh>R1}3rQFgt8|sb&e)8Ujude*P0eDb+@PdMr8wBQ_1Lie91N z-P9o-ZrLip8kIX8ZK{56lx{M1Y0q7H^g7kW0eSZaT|Fv6YQaNsuKTU`*W%&BzFb`h ztNG#e^s@%1M?B2?qzmO{+zXK`c}=_{abdThwqkQwdURu)^EPrGq0U$E!tH5ZZ@cIH z*7yIYwdWH>z)#${Sdrm|LU!n{ATa>Cx z+!ITBnam%08;pCYOYjfR7){tkLov$5eT02%O?OYHq)<25&<4^-I*3dpjxyo|!7-6O zBlhd8)nT=It*8FeN48#A9Hv$0rhfKPk&Z0IOTHiE_GK&x=qU3?ciPh;VoHr*y=DqL zqB`UMa#JGD;}#MhfA&P)*yS-FLW|9)R)16&U596HY8N@?U8Z7_FurQ74LJ4Oh3=J> zuTW@KM!z4IRj=(u;8>>^4^9>^=A9`@_yKManv`+0d3rtW z@L?IKvCRcKFP>BY@Axp6%tktjR&q)rIL{CYHtj!;R#118_=#-%9J`2%uWK+}o-WYr zElgL~i1B*m=Ntob<Ug3LPw@*OOF?FyuJRvtMU13@_kA29-+t2%J>!4HoaTwQssWz4@N7GYbugzc z`zbLmM!IDlvu{0C^}z6aBru&NnEM`^&X)oEGRBXkFXizwzCVoyc^jk-I}@)6Ih)ep zLN|XS4MEG=XKn)QXr*3&V-l4p5sn&uxAZ92u?KRUCE%Uw1q2;FCmruXK;cqn0F}wO zUJ6jH*jd${Jl0JTnDW%VpIiHz2&ew{`+B2pkfY2|1w!j4(TUTy1<-&0DZ9Khn4{Vd zaMPt!LR<3DTLU6`J6Di}*WyuWuIF1?rug)kM>dSEgwBF5X%RL8eYpAC48L+mia-}T zPF|);`Q^VQ-vWF^sdgOIyYW;Hn-nDpw0OztnJbN@GV8FF>H9DKVa*?lzZ0~fUlDJ` zT-I~T2Z^z=Y&M<9L7ZB1amHmI%mol?zMdW-)oil4U2NH9;f%NKO{55=X(n>b5Ei4! zI=S@)h^(hB9eJWo1Nym=V35#u-pj6#Z!0!%j}L&^Ff7?Nf4PQu>Vw2#@FR%$Z^tT} z=xVO_7$tg=Dnx%F{P-o?Y-01}mU=|>AujlpOXv+1OLj`8!PagN&PgGu)I6y9y{pE4 zKCue0A9^pyr0dv1uupl@k0uM>%UL!zn<9M7HLRymCRkb$d_41s5~yQ(KZy|UYFYq1 z`&ZDxTknP4nc%^HYiR}aQqQ^vO;Lt(FP*q=dEddWsrOlWlfb&gklvUdDIJhmtpM`e zld&LlX?Znl3A%4lW};wJOZfoDaomS?Q3?8A1hhX{i?5Tu?722UjE}E z!fAyS90FleqM-`SQC$?vtThnzylBuO2zodHK2iexx9_MZ=~4MQFes3vXSAqs*>&nw za98ri0_CxGq9S5>%d(X3vATt&&vD@>5&)m#s}&T$;AYerMcH=L6mfag^bcq_aaG#h zqyfe!fJdKA@2dZ}yB6T|Q0IsLNoT5na0*jvxG(b=!SLtjA8gsM9Rn2hYwuj7YK&?h+>D>xV~uw5 zUz(+$jpP1khb&6!Fx!gPwS5}@&@Fq%bZA3y8H^gNsgXQ@;&NDXyI(dR z8LxqhUGQ{}0O!l*8ra~m%X)9ybD`^N78t6u)O8Gd+?G7=ASD2QYTL-ujUHN22|TUV zi|X*F@AVNb7W?G2;ED_ueZ2qhS8w6WP{bNk zXXA=-W*F|tsoekq%vomeq%y~kb%|0>9|(^UH)L}fVeJz53ho88f!%=IpAg3t{}ion zZGNnJSLm;hT)RI%!#!G2INLZ|Ouj8DK9~^nQ3`>4PI6;kd($wC$$;8Lz{9d}_;wS~ zi|JM9@HOpBst@E{=QEERpWl?m_?znd)*Z3TkgFYb;)FL_7N zbO0w7Kv-1)KqeHwsMB7!LWfmi}YO%XtOHsHNm|2Xo_%+G>B7P-YYM$g^V_~a%o zWkv)xS-C|FkFC6 z$liZHN@*9s=-&HW-e1!i{Jfuk!97%q+OjX{NVK4Zu)!|fI)!scCnQ&0v;a{$CQ$_G zWdrID@0T;OeIQ7n_>J{Y=lrdSx3{+GQf&pyRO(Z3D>zKrU$^OgM@1UvOA~09?wrXkUWpGyM1I2+dZoBWzF*b~>j2mZ$zIkD>w~3z}v+1>Trsw0z;n$;t z0%3hTrhV@-Lb4PMxa1t0y}mCkA+U6yBMmi}->KnVG5e}p@6Z`scXiQI^%C%A>gLm_ z;BcI#^HXg>bs?MM{mgq#&P(%jPu=iItvK4fe*(?dF-_tiK&7U7s}rwBI3s z`Ku>z+b{6?z4Y>PEOexGha6JuVE44{XdDu&YWjuvaU52g@y_Q+|2Ey2C5oL#6bXJm zZVl{SD#~*vNvZfkw1L+aMyE|T+d4Lx!koYtMB}=Lw`o3SA!6fc2pK=* z-x|=kZ1(yXB;W%W75EQ)Ufm)5Xxu5c{>=O-WEAg-#jY`7Fqh8W!YP9)EL2cAd5Ene zoL)AKjqY-Lg)syczd)s#WYuGfGCU&_Pi-riyS2)hI35!%!*IY;3m;u(;%^VmTf-oI z?W3kqB~s|;h(;`1X2PZNJkF*Ycipd}M93kI+ERO~<68FNX8j~P(eq!}WV&TcRUXX$ zh5pH+a*)zZOhgOeIr-vQVO?6F7PF#)N10juq2ODYngYK{DdBm+MHX|cIzhE(gcecy znbH1-t{9bf?2wIkalycNL^+;fg|O?Xi~3Bo<1#4>S%9@zEqwXAY+F4{(0jCo5Gjj0 z;9TmvUKOz-wBRVgnU6`0wQP_19zx&SSpDs-o}pgZ#~med5^ehI6uOenB-o8I6fGK= zx*86<64i9)M!AArL~Vwolrs7jc`j5Ew~d*8C-5fc&Qqu2ZME{ZIC|eCOCp)Y*jSHG z;e7GK**p_>T_^YCM=vJPaTaj;ImRysH0nA0S-r#_CF$TG1GEJYRLcEz`|xlD@b%>= zml(?X4m6!HA^!$C5j+5Wd%uvhWfk*Z>M}Ixn9(huETFk`Hcu+iJ%HAH?$uuwW8hI% zgT7n}TWvP@wAvs>bMB{i&e-<$4F1T^wx`#jr- z>HJ{{{eX4?c@b$Ckc6hT{(6HG!qdrbh+aZHh9>_770*M80lHa2ZU?s=uL&kT;z5P_ z>7$S)cv|N)=m}W6o=67N4pksR6aCYm_O`2SzH?f>@nLy@eyvk#r@PlbjIRgm z4&%&)%sYPFuXl$8MnqcS2bRBF(dhl@VMHRyCAQyBZCm1{?9cCNtW@7${o7YiG*8UC zI#h!2Y%&eIM2}nFV*BRDDuM*6F2WlEODNrZ!vGcUl-01Z7b`^Ei*x_~H?r{{0pC4P57&hOG#%N<#VpiK9GQl{ z6s~a`a(p4xALxlQ=0WdoubCzBg$s)MbTmUwSA-F`hTefWtusOLPcaE!=C*K!(HR}3 zakf40X+8|vo^!1E{mJD%JUq2av*A}KZat(!w@pp?NgGTB`$y_{+}Xp%yjjqXZ(A}x zfEe~pPE9E<5huEV8N+RJ=n7#6iKUQ&JU@7=NfI-D>0%3{$*5uGTTSgrZg(oyr1_nqu_OHRgkT_IA=5h=8r0*;Zy9Tz;#o3JN> z$QfF7%KMlN(YQ5dS1ppJQTK{%K{uD=-^r$amsUv)=^%@ozVG=MRfD5qEn4dtDvgjO zU8zbH9I}NL{xW;0zaeos2e#uQAw5{&xtH2*cw_AhbA|A7!SP_r44BD|To0{F5-2t# zT+x=1jdD({LV|I`N4l5fzDjZAz*^|@*SKNA*}(T%)8{rm7Ymy+8y!^m6+XkP;wF0 z%7(PQrk&h+5~LxcB(EKnDJ>)nC>^pA(`px^3w8=;sU9V>qTU&8P%ATEVQFqNF9DbPbbkb`4D1#CKx-3{Bl zE&M5S=B2E3`tNVpAhIWYlppU|-IPfUi$FY3zAv%Bt%uh)GVu2XG>}{b05*hpO+1zU>nP_^6lnEXxQu!V8DDx8U}enny>)? zAGj9AIQ+o}^u~K&aXAAe(f+bOU6P>U$qE)*M9J&v4E{i zbaU8h_Gp@LDt`CfjPsPi>D6%5Z0ZhOoM2jr7Q)tee?JYq%Eh3e%$GA-hMRJxU0Y`M z$cOysl`F4V=`0Kv0qcdlQc1G#t|ymd)gMT?fvgL2n6X({kRMZ;)e}ZcvJh)CW$f|d z=KxSU0c8I>6aokKyVsayKQfa2lZ+dnLB8El-RFCyP)`dR3$Kk5a zBoU&?=o|vg{ofg#e+%yo%JiI(I9`_}aR|DDSs5ktZ)CAN=3pL{K|QuZpsDYWU$5`i zK2sp2SlPeL4nN7yqo%4V2{R=9LPJ=cmwSYKh+|7F}wn*Bp}tR)I45T zzat-vM1QTo%0pmOp)PHck#hUy+-n!Do_gNjH>dHj^a$^YLx}xg@9MGe1|Qf~&UEft zMttw)RqF{TTofDCRzx63uGOU`X!STw4ppYh)3C_<{}ii5!DA)!)w*gq*fO<}D;^Au zlYedWIr}dk?Trof0tPihF7FZmp^;meX^=Sc5KT&+@2uwh;ik>I_pbfXz0a)fU#|y6 zvxP1%vi%(HrlYfvuXVrQdoql8&n=>rxt)Kce==p@6t4~mumhJ3f>Psh0Fq^3P9CsI|eDX6$l=3vowONM!o}}F9TU?NuQu;H*6>rVU8*H_SmhQ6^@T| ziM~=33MEvr)4Vz~zR{*>E4&)1gP->fff~yV;8>A1?z$J__U{$QsqddJ5|j>M_vrgK z?6#F0*p=xm&e)||WyILHS1Y&H&=%Lk*r{&+m737A{sUr_`PwvIr_H?Sau_w29fQRUx9efElpQ0l~DIuJDTDVkiEDw z@^v*Nf_|#8e%{lo%=gzID1h1!QK!Rvp_Vk*yDI(oDUau*ZS6%Qpsuorj$8manqMFh zh+Cvv+0u|#bp?1Hu0WPMSrpY(}WH8Wq$}dc+|-h5>L0 zm)pn|zk+D}wU9?!BHBa+^?uR8RE9H&BMZc8Ns&un6+IyYz|A#3@JIIt(UMCt=BlCR z($MSfV9?<>6aak00c1N?h|&{!?1{pGs+imFoq!~#Yy5f&sU#4Uez%v=-aNb_2lGs# zOESvGfkE(K#9xD;IWvgSeg99l3CJ(Vgu~7*%nS^|W$Op+9V81xqnL)(y{*bwm>!`g z8*%QlO{&4lpxSpTl6H$({>$?Bt)1oDGvnleeAioqdFJ}xa;lY3G(4|TyuI}G^=*pN z%rC*#bA;X|@H-C&^#bSkkhiVTB-*XgxhT*#1GP-^(&1r7`K49(kBjeY21U*1@55aO zio#qUrsau~(_H_6 z1r$`l;MOPDm-G_;p{dj-So~m~J;)e!teC$b6s(82lzeFB^XLogX>Up#yE* z)o$JO+1=QRA|xOx2ja*tIN{4+R_fRLpIW+ zX)?JSNo(J^J8#{i6ciHpg{&L1sLvd{2Xna3aI^g8^}4?_5gD{Q(Y_5e{PNr3I;Q2i zFG_P4RgnyXjBsbh<(lKcUHE?J_8@$wcGnl{|lebpEU1 z;W{kJp;P~t{qb;S>zIBeo(OIu;Vy^mR|LC_NykcL;zX6vd~B4*N}Z=Yp&lrtS|F~Y zl}$t8JD?GKF;J0r@r zM8R&)c=l~{w|UZZTzbsg5Q7{pdlceM%ZGRmT=`?xjqJETJSx)0BiQnuiXo(!BL(vW zMIr6?Cs&(9iu!-#MLmC#`-0kIk54?##`6}sZN4`(Ca_8$7vy+$>u4w>^fEkHi6`u- z`1{dr$;B6bkh`BK{ky-Nb*LEJNa7m;I}Xw?9#MEIpNAl3jhYZ<;6-KvChJd(kngt0 z(h6pM6KAIYG)nOQ1t>Jv%i|TeO-a0pcJe?dWOj{IYuKWZ>=E-5r6o#H9H5L>eieh4 zq7B3`gL9T7nHVdlo7{68i`)|(vyD|RX31N+##j~X(i?gweb}Wt?;+5pIyDr6Jvb@Bu!C3*`g5a0jx&dMwskP=y$+_vI+&K%foG1# zS(dS_ef>WG=0~L5wIe#~cbt6RKKWDI z{V7p3Peh-+PL3@0y|vGiS}R7p=-p?()aQw2$aq7ymy5?enRjC7?E8j3TZG@FxA2=7 z!f&DpKX2%Ec65k7&pPS9?E8j3TZGu8w-B2cjBQd9VopCHb~5dx^s?_8`fOodlitj0 zVlb~siFx(2bKH|@Ck>Z<-`3&bo=iIKn@Q8YvGB)9Z~i#eU0wo`KAxRVbVQ%W9oNu! zept(hV=i4Wi~x=a#mk+vU&O$66FesqyWknuy5+=+-UC|}JY&r>=V{t_w}JILG9=&5 zkj6H_Gwv;T#)jY-Yl6oe`flew%NG=`gy22#I&M_YVu}i4ZT;^ngvN#t8f!vG@4s5( z!hihk)!U0_7iT}ey|}vg=H>IBpFMwjasK@36bx<%4hPaB6%+8{@(sWlfLVrD%t+%S z;&$9>uANvaom&}8kw~}77;P-Eh2nFM2s~NQRGuI^PfiO$vCTCV=$%>|#Yaw#?5*>0|J_C2?t&0VFWZ z5Wg;ntugTpACPIwAT~81Q`hcp^K3iG>%EiQ%78fa1ETGu>+AnM0$111E?)5=xVZcl zZZKOIrFGD8PdWDEg!=PG@uFw99X+y0Kr*{sONvt)wIg2iCZ(*QI$Ge4+t>LwJ?ZAS znV#4kH;zr2b$Tnaj-kvtC1tj6pJ%gfeV)x4`fO2Vo!-ihu6ISr=cj(r|C_1Pj-o!(N_F@%UylBzx3h0|{FJM8<0K3gP6@7Rs`$eS5`mJ)=C zkD)iO6P!vwG8F+HffU8$hK&P?{m*x?sS}IXV&^8XVUQmbYedNWu3Q; zXHSJ-KJv!Kcuw^3?57Y+Ix0aEyAs3*wDq~CLNFhBzR~Bg*5{sHkIAk$U-ctyPe zz+Uw3vuE_#*ZX`@x4R}C!*?e3@Eu0HZ9IBv3iFZY7~|pU2sTKe4be6Fs~C*?l7^V&Ykg{%}K9*`O0B@ff2;NRgQ z0NXVBYsPoIN>;=1zqxW`?M_`9l6Y~aT!Wd>r4zkN*29R(fiR!Gj-r0zG_Yycrqa2+ zRXW#D>0Diwxpuos$u{8=7@`ElA&P??pee+$wL><2&F!tP zxrV;xPHQ`4pFB2e1;|=OU<{glZF!I>PnP7yvXR}tee|De|qPaZBy*k=WJsjJzn>Yo!s#N-2BdnT`#6#0z6cuOVdXPFL;QIXhwV<}63t&7J zd2J}pwkfKI4^srnH8E}uz5+pnV7yI4%_Yn?t|%fDY*S2kAYle71Pe@6ZieVDPer0B zUae570`OHnp=}Df!w$Z$9@B_jt2bLn>7LJNSRlnOwLt_ zfAdusq9o&mN!YSmtpky#7L(hNb|*6`KOtFX=rW z6~mBlbtRI!*y_o#sdl|JJ43OXn`D$Hr#t)k^epinxrb%YZ3<{F{gX8`R8L*=bXsVh z{W+SYgEoz`x58-%^g`WqhrZSOb01vR(m|VY)>}6-RI`cJLC-w*fYB}7WirANGEEw8 zkW6NiDLiBe0+iCBs`^c0H7H^zx*a-??KvKE%SqV0??KpnWVpS?`cRmrg$S9J+JrIy zBOJd+R`bv1wCeA(D%0!h^jbX@<+bUbbPKfePppA2Cs&w@2z2T8^_1;^ZGv@Smi+1qs z$&+)-QPsTfN!5uty-sZh)j8G0CW#P_dEw5O3~!PMFLA(2=*hgL>4{@8lV&z9;3$ zt0n;E)Cb#)l1*`r7{LXKxR_Ao&qs3lIx?o2l`+|}etReV8acnS=IK+R=zQ7g@#w|% zQfnB8k(^K|Qur8j%o_9US!1>g;NA(q({gms%(4J-_N3e6)dT2q?3%o*L%+^Y)m|3E z(s5_o11+W&eQMfQpPH8SscBiCGM5I9rPh?BWWj8@2=4d@P`p88D-Psu5qytQknJ*x zHkSC^sYMx@_Em%Ds_sKP_=#*IsxbLsXsJ zisPFbez$87LA=Rp|BJFNH^E;e%juYp@7we7ZRz;Ev+*ZoBYaxo#M(G$>{i(;>Ub-H zJDb@uv6$48z9#jgY*J53CUs33J@@*8Z3502)V%Jc>vuFIeQrwH)_F%0-4`Z$PARR3 zxcafIKR=rEjnSQyh45rF)yJ|nMp_)ppCyUtcgIu!-<}FEv53-1Ur}llnV6JBsXZ*! zm{_OdDsdWCiPx>n9{b+(-HONve)hmGF#zIQk&P;I`f$9m4RO7c?_JcwsA(}NNqOxw zHP_-Z!r7-RUxYRbl!An0bd{p)mk6YUP>{eZyCrF8>qEUD?_H$As8KN~3G%i_Zr-e$ zrsB=4nu@I?Mem9fMnQ^6Ns!mn61WnU@h(p+3Q-b~9W$MeN;yk|Vl!ca}WbUUzqii(&o2@Jo15sU+rf-^QQvisdsK+oi2Am0C%)I(edZvgLu3*D*BHvxjE- zwiqYBcZ`#7#5nnSjFa9;6{1#{GawELd)N zbLNxhcid8b)0V2&vHjk$S-ugQ zsfqc&6c_#sp9c|6G6WKsQs5l{7{Y{~P4Kdg%ywsg1nOcHJ{In*+kSIr4KYk^$Abb_ z92C@f=*4V>h|2P`BnBCU6fL(=lp$)Jje3RO?|DrKZ|NGd;pwwso<*ONWC!pE?jVth z{HSscN(l(oI0{8ceTyI2x5ZBRJ!7YMOLOD7^_`Kr853xHCWim>?UmY8LcUcx#k5s1 zYqFdZUGrm<46N`Cip5cq+wmC1wI8GSwkRsUXA~7{IX8yK(T8Vd%=Q1h%_vAxa)Uzz zZehx|7w>$q-jEP1Ar{AJa7#&o(hbfsF8%pPOuAV#?!;=*_?7@Jzi$ASKQa{9xjqb4 ze>Jo0ZeYrIid+`LqM<2*n+V4UgbT1uqYS{6HKg0OL`3<0BchC8d|!)*lD()W!=^>{ zRw4}@a#lN-`Ib{I15KK3(@3UxsB}-aW8$l8Pki+)o>0H9C)6mX<&SiQ(Vo6zFN)`O z^!U4WkH4+xR_~fyM#(LIq^oT9yd6VscJ!aS_E0Qag{|HNwv75({zzBVcs71L88)@3 zw^n2*MSeRnZ2CZdb)Za!*NzOUB=1XxDaYH9VH21=<)vp%iqnP+Tb-ibWr~a{MP7MQ z##S=wC#84cAfs-OSDq9*8TFIWzg&+w8crKB>aQ<3>3e<2$;d1kR2~gmEV{LfPv6mS zN;f*56!(ZU)8W|cI;Xc?=NNXKquF)NTm<-9NU7g1PH&^eF^n2VGivsbQa?RTZjCwt&cWox4G?P>4L5vKWHDRld)U!NNzD~zwTKsmj z*!W0)Hc}?TYez=Cr0HE+$fzvj6q2Ty3>z!EOA3~2t`cWIEi*=P-D(vt`cN}7Z+{y>8%p1bEcG>8!{Q&3JOB$k8UZF;CspV)y6sPWIV+ZZXehHnBVFEp}&y*qxbT z*M3<@$wZrXJAahPM~I?mr!FGf#@h^qdGEOYKHqUD=9g8KzF3l!jfbs= zb;{DLud*~ND=0HVPpWiJ_K8H6*mC{GHPH?E-EkJAIH~uK&n)`RtgpT^E9*NmL*J>H zG;vUIlf-7^j*Z?r#c0-7F`AVXqnV)?S;~|0Ru(dPdB9l1ahZ%s)38b21LK%bo-Xtf zXH=|ko_-?!6x*0_qa-B($}(9;TVB)_>NyDWZnu%oZI_YHEIQ+?ug*9t>x?r)XKd*l zoOcTkn2YFua#dy=HzrGqlXx+h-QqFkA{>KbyVxWtx#1B`{9g!!v6xu4Mf9ukvt3N# z2P|i=Q?%dQ7VI~(sM@o>sy1tAC=MmPp&H=Axg0M7FC5tG?LxcGf(`VG@6KO?4Ng-z zwUbWCGxN!bS5=V#!IwKhJWbs@&^TFuG z2_}ARZH#mqpJlH|{F)Fx7X=S8!(FLLtmKi)#>8|pFl-lL%`8^mtgqEKH7>)M85Unr ztyo{CuTe(RZ9qlQ3%=O--8YO^Y5}svP!&r##7gRQ%jcTg(z&L#8+E3=Z`7Ic`z5r^ zKh>_(F@_}2OVCxP%xc*70ryJ?6G5$CAqWp7#y05KWy@*Zs0R z<5+8U%05z*(IRvSi-_NOx5^`PTj3E&ptaZiCwy*p+A`tg3IW?hW|G5*yBA9FT=JR} zUIPXObPJn^Bm4;oKRQ*||T+^8{STGzlgQ4-UTF z#v%?d!iyB9JFdxGr(1L`Bk1;haD{oA4TuPL2r(t7cq?voXX01>y(C-{fgr;h9KjSM zkW!S!M}V$zmgBgE8CYy_#6@$8cv8m(;+UcsGIRmSC|DqRi%=}|E&-l;E1x-U(id3#Ayd%nlCzv0b1vMigbI;N9Q9cKOB6L+2g; z^qD3-4h}wo*C-(wrX<~gkAMg3eFSe&%B%tK@!;c7dp?%_$Nt43UgYU;ydQj+4i2u_ zVBicu@EwXa;H4ZEksW&QkTR76QB^ z+Tsvpg(xWa|A?fk;|+|rFgpH!c#A96;xC@_g10$#+~HXm;&?SI*23{2SmHFJqk|#1 zLWpC2|7RehFb-iF3akRt2wcR1?dLarF$j3W z?J@oGFBKXs7A(Lq=Lq8LK`}+nGWninJ>Wk4#jcP`tN|y6l033FgE1ZrP z1vN4s!9Nh=?$^77ad$O(>|er*uJigTlOL93z`;jw{XgI%$Y{zq{zvd`@aFn_@D6+g zSBQfAYEy8HH|RekMhvoMx)yhzf{)Tw%Ygj)8;8JeN!v|J8Ta#^+U$vHTU(tKC8wtr&)RG8b3>M<>WTdEOMyEz6Pau#H2MiUq_8Dv*u>5(<8un)r2h zX^9G@dgOFKF2Dc;4A@XY6GU;BN)Vtd14|qswvuTJ0>34xaAV?lNse-{OTkZUb%rF6 z!j{Q45@aLIROeEQY||lU+){K&t58xtlmmABL?igHepE*M>cEd6!WmycKMjUMxTWjC z(I6%<8vIMGNNpe)Hoix2i~vkme0ydiwrDdPqT(*j;c%OwbQnSkhapb+U=``M6huVS zGZR};fG-WQ0wlbSnWYQD`51zaU_l6*%y&x|Wr$J!T>2%qaa^6kVrk=8UM(0}QQXw+ zGhQ5E2T**2QxbD7bpun(aAxub!U7%Nb5`&##RTN@zz3eG9R)yn`7sIws9PLGY@G>n zof7GG%%@5E_q1**WlOPCG5Atf*IEkiF25crQa3FsmRsL}6{fcR{X-%+iI4+K#6T%#B)2wiIv2gR+mM|_-9Nf0AM6h})^6d-0xAPeg%lXfM}bgQI2 z|9~^TUF4~+oOt$&IRe+pQUd5h!jJhdx3CsSY{Z!6JPUz$IQ%)y;JXIqI>PZPMOoHj zFTxnek2PPp$yaS?Wcqpy8m7qWSn^VV-I3gq^gWJO&v05ES76ELPge=SQRiyL}R7l$o;$_+n6SBt#&CloHR}#q7%MnU+KMx z5zW?wR5oP~p_hXyBpyx4mMv`lv%JVRFYSWqns47r61J3vHFS64={be_7`g_%A3M)6 znY>(wd{3M_$JLRK=j~c@@gyZ13UPD~OC<-TEtOn9ipWZ+*4Y~KTMf8&ACdRC`!Z38 zD%wk~uH>ZDD=W3Yx~w@3e)F2sp!ZvIIVN+>>5%Vf&E>c{uDQHj$2B+Ni^8Ovt+fQw zbtV?biYIt7G=kY#0KLaGB9Vc5^ZF$N^pby3G`&gU)=SbKMy<{ z-X!s%(e05S@LL?A@`@bD9WXd$()4Jc4z&lTgX5bdK2~i9#VckE4^9UR7B?BVBvS3E zc$tIYEB;d2+)x(B#s5JfenkzNSXun!TxcZ9gl9|O?d7YHy*s1)7``mHOT;rGeq7^V z%@>(kTdburaTikVmJL`NF6j@@@bS^mbOo_kO5ejUWGb*&01LEaYl5cyOG*TGv9lmu zkNDy&+|kA!WV=lkJ*kje&vd#o1|EXfjVG|Z(UKiVO7Dq@eR^7%c2~nb3X2ED45B19 zFjjUwun{wrV{vd`a>#F4rZOx39a zI0Gmq+tu16#EcecWR6U3Ddd`qNcFe^tBi_Pwu}lptf<%w0sDLe-oglnYNd0VN;NtH zYDP$^#awfw%O#F6-PP=ZXK0CIW}T@|0upEZLNp4}EqCVp^iztK|0)g+-sgL8gbC-+ z#{r20l+f%r3)U#yMmSy#(T#Ac9W!%w6%P{<4r3Cc<0lH&5XRvU#uN|LFOo?|369YP zUy7F1B|d3fTm_I(vW=ok65+tGjW3q32)z`hUS-VB1PZYu7zB_=5C-&AKlRd}uhv1z zMo2$h;mw*+ncyj0mEqp-T1npjm93#SnVx!c6#C;62RaCi{pAcUrzh?bg_Cf+3_N!- zai?&xbc3;rV2Gx3|777!!;@ehc)@IP;x|*nu``P5bj%-aP?|C^#*H`jg|ai10axq_ z4rEJ77QjgKB%j#7sU`e(#_GZlK=2(&@qbv`h?!8}Og5Bo3Ny8Fk?3w9`$92*^;;~u zd0W3?Of(%406Fn3)vUQXCQ$0seQQtL=rB8^K)e)Kdu+_RvHNJ7gJI9FO|QF&kU zxNwD*$y9tZ zw71ND3^nhjxTC6GK4j>P`uYR%s>%5pS2-YUIkGl_oaBT zr{^>!QH0VxL&?N6&_9vdZc!xlSk-*W5Iqhd+K@Oyv;j-4md4Fkt?=mGG1@(RGS*m* ziu&GcZyjDnYH#iG!mQf( z24|SW-{FjL+Lw64UGx%=&t2mJ{uNIU5?_P0_#8yydjlrn@hNY3Fy$zLDaAsTX#6$C zks1iCli;=96lhJGFl5_wg>2A^(KLW>;0GXEHUZzp@CM?DucbaHO6|*tm=;OVYG;F6 zUbvkT?65q~KYOJ3C^!Hx89C!ZhF4>H@N-QaT)R*IJ26;cd8*lW>J<0sRm^ zLlL5=+PnZg0?+soWgq}v#oSh1Ir z1S3a8)RvjUPyZ^(W3AvY|E^9bzmaswX@;@RRv2<5uZO~_>>|IKn`~o#0`%tUn>@Bx zlkfbD-!9t4YfYl-rIC5(;!JeI7-D9(3Y{ktLoH`=aQc&YIXE5gYORB#0bhKB(}6qq z?O#WO48b&5qb#2nbzBIZy}DB8zu8f)ysGdxQTtV(0UNjjDauH6gFu``guLG->O6wP zBIQMMpJa$`6S;cBIIGckSWf+RzrEtgX7h) zbU+MYB9fxmR1f8c$4`X6pV`55jnvPFvX6D{sP7?;>**eW>xz1I#Z%i9uQ&x~hv52u zPQjb&bMVa}xIDYM`tjK*`0KB~g3)Vv^#G5@{Oz~Dg7e}7{-F5g+mvkNUjU3oYA*Qi z74fcKUMEpaKh#?uFeKa8fAfK&G=|YdOi{Xo0jk=UZ!#n!qOiJ)VOrn_L6!8oTh6l%m+909fOfuinQY45a~^y5y$i!|DA5lo;jSq}gCVD2c#G+p|8och-N%P{PZiUu8Rs91gcAMB zqTt1jY(?enoZC_Y-dWh>yBuZ39V+MQEQ-jjat3psIr_jj5vD~m6*|OV;U@2fgjw&p zz)cQ|QcL}tyrJoQD78?20shyOx*@QnKJiyva}wU3{3|F%fGtu4vmHoq@LrkcOP+YF z&VQM?egyC)At{A1wd_n4k+Ij8z?#aB(O!2#@nK(Y!Up2_uL{mcCw0VL?XiCIqo#Vx z^p+n2G38;w=8wnzhjmD{lrVu@xAf1pltk>EHZX!atN0UswH8U~k%$W7zIlF;KU<~Z zM&V3vT|deL7i+MkJ4!h(GtJc-!K`*Ibi|=q_`@Zpbexr;8AAhTxHI< z&YaJ7G447vo(`HMC=LZ=ktxEF7Fe=87AJ2hUTX4gtI8*o4FW}9vHqTBC}G+fIxG>w zs3Th*jYTr4<8BmQ6o)*JvO3b7Yyaf@i~pm{I{20xq7QJBL}(O|07jgVFea;ni|GQB zyOgU7bsHf^$4}?gKk9;{F8Q(Ly@0PCuU>MIEZ8DnFu%qDS^<{(zS+S>fhBy=F${n!s)ZErs`PZ$n%0G%C;tk4{{;h~-Qvvij zlAKA&T&YYqtay^tyh?-B7gxie<+p8l^QNB7C?!@w{R1aHS~S z;8-kBl7=YVpF<)q3vBF`Ob;nOQQ;x!Ha_B4D~Ku(`4>k#{WM-NjR~{qrV0;VasqRN zmnhf;W~|h2?<#t6@uiwvwhoPRJ9QbUMblQVwTo4%=eF{r(KfAfLj+~dCf`di7IuR0 z&2Sx&ZA!^z-@JZ##Xj9;NDJ6x9eDQ5NXOWC=A2)%YCmw+!Sp+AR!Hj2wG#Xe$IP@QL1o`j3gb!W51Y>I-#bQ$=wsq6ZSVC;te zIE0?>1Y^g8-QtK9qYb?DFSzVxj_cgp~DOmUc{SA*m{1B|qYGf~8_% zfaz`o8l9_vEF24WBTcNNsx2_60#hEQU4pWaJWt3@3*`dI|H~hSsF0j733X45$yr~K zkg4I3yf8_N7rXaBv6zRk2ug$xPKLNOZt@n9hdP*kELg?b1raXXOy+hkq3N*OWxJsO z-VS#K-=2-X2z)r1F1)~U*<0PB7;<91dN11A`Av1cPKZ_geJ2gA^5Cugv&2v9E7=Ni7=PrJ zSSc4kroTwPMcK9(l@6=l9siB>@n^F9nXb{#qT%1)9p$GYlz_hu|0<&kG9CJ2OUnyG z%P_Rg!9BYq)ULK*OA!otWP8o>R%{tB^-fjtIsk()ER4JwEE)cfv83kn`3sz<6+tmE zWSR31)tMCivPBuqdsNG@Y*_V+H|tz=5|{X(Tx>FjeX-=HZEPV7-yMN)7sCw>1b@pg ziRGn%D)zY4Ais<7-BBs}G;fU38b`OBLLE{@Hb~r0h@uP$U_9Zqe7UIJavSp_UKE0- z8tOy7B?ZuU8%0MTCe^zUnaac2JEBK`m+n!aA~ij*5C3*y+mLUhQ!60xzf~nH?(ch7 zVu|lYat$&)7J_WM7;?uf=Cu(-2DtLwhQ*f7D}-X2iSnEl3ac?z$xWbwtE#M=e_n~M zIxQ|nKa&6a?(zsEH^C7=n}qJ3;q*v4!j6jA)1#uyDU%Je0f0fZCQ6CrC1&HT#K*qp1KUSoR$6jZG3F5{3v5lW z`;KIkGgVO?f#6uHZJftIGJ200lqHFH7B0!p$3^wXNhHzc_{{?H9fknhnh9+iP&uxjU3mo^zU#-PZzg-4A7D>ZX*)~#|?cFqdUBYO~ z_whT`pLg{Hh3KXgH^_%Y&~rZ%XQRkA2_d?jT zgDG+nIb;l`U<3DS|-cQW-}gKS*XEzL?ws0(Vf#0 z+a5f^d9NLc{W^G$c7xM_ssb@M8YH6f%4Rp@b^DJuyJ7zJw|^OmxkM}AHrsp#DSra9 z$>@>Yh!!6<8qjheTUpNr-cM|>WowvnpML!rQl2QL95@OIC4e{0%cPess><%f-#D%i zr&R?)P&?Y75N~VG2~^Ob{DKlN_#SOYx*HVh4FbAJmKk{Z`t1AR0&*V750-WrMVmw2 zZ^q|NI!6`AHKc&Gl1J4ftns@_Iy3wqq;h2Ijx-p6cUSm7NYMBVr$v~-**maAkY6>k zVpG5itjM|~JF?|x8JUW>0^F_4bM-hNAbTZ8v`QaE8+(d>?>Xn(3T+Z1D!IvVtHWJ4 zgKDBaqiN)%ezuc%15;V)><_VbCApvf=2e7#&J&+*t=j5mIPd8;{)6mzN$lr3^>@wy zzsI!ggoI~%%Y@X_>`0MUTGY+swB(yDve4GqMVy~NqOUkA(V1yi&Kr<3W) zk^1YLmmU{EQiIdM5B!?F?{T()G*}Og2K@Fty&eDIO@>nWw|)T^|E|b&FNY5+;(($~ zt%}RM11W`(tz;utHGk7LsEW&%?W(7?1< zDvz>DG2uJADbML#oL;GKL68Sg6j`&B$z)!IKvo=;;hHjhU!=6ymPLzWFbcExTsn)L z&qF?Q!LI!t;TsgAEE_V55c7ZW;^Et5C}>dUX8ezl`rJm@OZA?AU$<7va7OBMzs8j1 z>;(%GUw9Rde7bmS=&m)%q-YY9EA$U7-cqdtRdDF}t@l zYJ#op$|qT+lDXQ3=t{ocvqB}5`(2+BXk~ROWUba_R_Z_vlm}gx3h6zsN`0j6ZB3Se z)^y_D*CQ`!->iS;h58$`PaRNC-LqWRzoL1TFm%y7Wy5_4t4OLEr#BiG6@lHEi=2}% z2tzlV2F`r3T+YYyz@G(Zyd2La)5RPi$MwDCNq91z`tJN>x`fd4{K?dVHK`p2K}y|B z7tp$Hl~)JI`ZljgBr=J$zrVq8sH)R2SfikLx8GDR+qXKJI(QP-9l$nGE8jJm^k-FX zKuhR%09(N8kqyyh>Ugbi3yH7!yC&kYEpKMaC&*vRGtw#{BY@)|+NvrMa6xX6JW>l4 zJBC4!pMIt(Lg&YI0~-u?kC@)Tucn+BD#j=Vx?HaPut5G32d>0sEPrA9{hGRkkR2(8fb zEPxST=F*pTG|&rxvgK2)BziPRRQoV*rp|$16GFeuo!;tF6z(5dY`j6(?Y+ z-t(23IE)YrrPQ1oEm~k!& zvoWaZn-RDY$2?sspVUA`LuVd=9Uq|Kke+ZaG_eSTT0 zdbmQg*r~isE!#hDUccmT`M%Z;m6|$5VY)(e-^wj&E^6N!&K2S4FR^+)0LzqYg#KLA zH0E!(8{u66@EuPwRM${RCxX7d6nl~Za)qqcJPXG0_q&7x=99pSCrSN^4N)i=j?&JG z^!1$oaTkVdRg}+5>lvWN$@lQVDvpjjCM#W3)uTq(o?WBhx7;|Hz1T-CgmULn{;dh6 znv*Hbw2RA9#DvZzbwRyJBJ`9o*M(%Rhest|djxWLM+MK-$T(B>U86^$#uzNO?|m;z zzU%FvWg&ZOXe3jdZr6y-xn4X~0xYyCW!cuCu-u+@U5W54!xq-(NL|XC@mPpZRo<61 z+K&JfKyap*77C>kkLrb?^J$Gr4}?KZq+6sNVl;l zIVvHQuD%fv_%x4JDGbmhN-+>A2VSe5f~103;#GF z;qb;iev(&GJN#FLrVYw6xI(sw`Q@8QiTJ*V+PmLWPGBIun{4nG2heZu1b)ZgZ zZ2))Yt#y6<-{p-ZuX*|8B@7V^)&PZ=-%P!VbvA5Jb zFm8Q0)vslFr(Ilv;}GBAa0?@5s=QYv%XulujKciR`~23%#$%5kaf)8>yB!Q6ol93756@|JsX*5Ij$w;4Gj&+%Mm?vC^NRx^mk%M-^v@lPfvD4hDU`C_^} zSo;(3p0gM?>*+w)wI5;@?2woBJJ + +## Helm-Chart + +##### Scan Results + +#### Chart Object: traefik/templates/common.yaml + + + +| Type | Misconfiguration ID | Check | Severity | Explaination | Links | +|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-traefik' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-traefik' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| +| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-traefik' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| + + +| No Misconfigurations found | +|:---------------------------------| + + + + +| No Misconfigurations found | +|:---------------------------------| + + + + +| No Misconfigurations found | +|:---------------------------------| + + + + +| No Misconfigurations found | +|:---------------------------------| + + + +## Containers + +##### Detected Containers + + tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 + tccr.io/truecharts/traefik:v2.7.1@sha256:82ca1c80d44222f330264c1db7a02eff0fd2d4db4cdf53e7711cb6adeaeba9e4 + +##### Scan Results + + +#### Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2) + + +**alpine** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| busybox | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| + + +#### Container: tccr.io/truecharts/traefik:v2.7.1@sha256:82ca1c80d44222f330264c1db7a02eff0fd2d4db4cdf53e7711cb6adeaeba9e4 (alpine 3.15.4) + + +**alpine** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/containerd/containerd | CVE-2022-23648 | HIGH | v1.5.9 | 1.4.13, 1.5.10, 1.6.1 |
Expand...http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html
https://access.redhat.com/security/cve/CVE-2022-23648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23648
https://github.com/advisories/GHSA-crp2-qrr5-8pq7
https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70
https://github.com/containerd/containerd/releases/tag/v1.4.13
https://github.com/containerd/containerd/releases/tag/v1.5.10
https://github.com/containerd/containerd/releases/tag/v1.6.1
https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7
https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7.
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/
https://nvd.nist.gov/vuln/detail/CVE-2022-23648
https://ubuntu.com/security/notices/USN-5311-1
https://ubuntu.com/security/notices/USN-5311-2
https://www.debian.org/security/2022/dsa-5091
| +| github.com/docker/distribution | GHSA-qq97-vm5h-rrhg | UNKNOWN | v2.7.1+incompatible | v2.8.0 |
Expand...https://github.com/advisories/GHSA-qq97-vm5h-rrhg
https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586
https://github.com/distribution/distribution/security/advisories/GHSA-qq97-vm5h-rrhg
https://github.com/opencontainers/image-spec/pull/411
| +| github.com/hashicorp/consul | CVE-2022-29153 | HIGH | v1.10.4 | 1.9.17, 1.10.10, 1.11.5 |
Expand...https://discuss.hashicorp.com
https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393
https://nvd.nist.gov/vuln/detail/CVE-2022-29153
https://security.netapp.com/advisory/ntap-20220602-0005/
| +| github.com/hashicorp/consul | CVE-2022-24687 | MEDIUM | v1.10.4 | 1.9.15, 1.10.8, 1.11.3 |
Expand...https://discuss.hashicorp.com
https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/
https://nvd.nist.gov/vuln/detail/CVE-2022-24687
https://security.netapp.com/advisory/ntap-20220331-0006/
| diff --git a/stable/traefik/12.0.5/templates/_args.tpl b/stable/traefik/12.0.5/templates/_args.tpl new file mode 100644 index 00000000000..a395c6505bb --- /dev/null +++ b/stable/traefik/12.0.5/templates/_args.tpl @@ -0,0 +1,155 @@ +{{/* Define the args */}} +{{- define "traefik.args" -}} +args: + {{/* merge all ports */}} + {{- $ports := dict }} + {{- range $.Values.service }} + {{- range $name, $value := .ports }} + {{- $_ := set $ports $name $value }} + {{- end }} + {{- end }} + {{/* start of actual arguments */}} + {{- with .Values.globalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} + {{- range $name, $config := $ports }} + {{- if $config }} + {{- if or ( eq $config.protocol "HTTP" ) ( eq $config.protocol "HTTPS" ) ( eq $config.protocol "TCP" ) }} + {{- $_ := set $config "protocol" "TCP" }} + {{- end }} + - "--entryPoints.{{$name}}.address=:{{ $config.port }}/{{ default "tcp" $config.protocol | lower }}" + {{- end }} + {{- end }} + - "--api.dashboard=true" + - "--ping=true" + {{- if .Values.metrics }} + {{- if .Values.metrics.datadog }} + - "--metrics.datadog=true" + - "--metrics.datadog.address={{ .Values.metrics.datadog.address }}" + {{- end }} + {{- if .Values.metrics.influxdb }} + - "--metrics.influxdb=true" + - "--metrics.influxdb.address={{ .Values.metrics.influxdb.address }}" + - "--metrics.influxdb.protocol={{ .Values.metrics.influxdb.protocol }}" + {{- end }} + {{- if .Values.metrics.prometheus }} + - "--metrics.prometheus=true" + - "--metrics.prometheus.entrypoint={{ .Values.metrics.prometheus.entryPoint }}" + {{- end }} + {{- if .Values.metrics.statsd }} + - "--metrics.statsd=true" + - "--metrics.statsd.address={{ .Values.metrics.statsd.address }}" + {{- end }} + {{- end }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress" + {{- if .Values.providers.kubernetesIngress.publishedService.enabled }} + - "--providers.kubernetesingress.ingressendpoint.publishedservice={{ template "providers.kubernetesIngress.publishedServicePath" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.labelSelector }} + - "--providers.kubernetesingress.labelSelector={{ .Values.providers.kubernetesIngress.labelSelector }}" + {{- end }} + {{- end }} + {{- if and .Values.rbac.enabled .Values.rbac.namespaced }} + {{- if .Values.providers.kubernetesCRD.enabled }} + - "--providers.kubernetescrd.namespaces={{ template "providers.kubernetesCRD.namespaces" . }}" + {{- end }} + {{- if .Values.providers.kubernetesIngress.enabled }} + - "--providers.kubernetesingress.namespaces={{ template "providers.kubernetesIngress.namespaces" . }}" + {{- end }} + {{- end }} + {{- if .Values.ingressClass.enabled }} + - "--providers.kubernetesingress.ingressclass={{ .Release.Name }}" + {{- end }} + {{- range $entrypoint, $config := $ports }} + {{/* add args for forwardedHeaders support */}} + {{- if $config.forwardedHeaders.enabled }} + {{- if not ( empty $config.forwardedHeaders.trustedIPs ) }} + - "--entrypoints.{{ $entrypoint }}.forwardedHeaders.trustedIPs={{ join "," $config.forwardedHeaders.trustedIPs }}" + {{- end }} + {{- if $config.forwardedHeaders.insecureMode }} + - "--entrypoints.{{ $entrypoint }}.forwardedHeaders.insecure" + {{- end }} + {{- end }} + {{/* end forwardedHeaders configuration */}} + {{- if $config.redirectTo }} + {{- $toPort := index $ports $config.redirectTo }} + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $toPort.port }}" + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https" + {{- else if $config.redirectPort }} + {{ if gt $config.redirectPort 0.0 }} + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $config.redirectPort }}" + - "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https" + {{- end }} + {{- end }} + {{- if or ( $config.tls ) ( eq $config.protocol "HTTPS" ) }} + {{- if or ( $config.tls.enabled ) ( eq $config.protocol "HTTPS" ) }} + - "--entrypoints.{{ $entrypoint }}.http.tls=true" + {{- if $config.tls.options }} + - "--entrypoints.{{ $entrypoint }}.http.tls.options={{ $config.tls.options }}" + {{- end }} + {{- if $config.tls.certResolver }} + - "--entrypoints.{{ $entrypoint }}.http.tls.certResolver={{ $config.tls.certResolver }}" + {{- end }} + {{- if $config.tls.domains }} + {{- range $index, $domain := $config.tls.domains }} + {{- if $domain.main }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].main={{ $domain.main }}" + {{- end }} + {{- if $domain.sans }} + - "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].sans={{ join "," $domain.sans }}" + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- with .Values.logs }} + - "--log.format={{ .general.format }}" + {{- if ne .general.level "ERROR" }} + - "--log.level={{ .general.level | upper }}" + {{- end }} + {{- if .access.enabled }} + - "--accesslog=true" + - "--accesslog.format={{ .access.format }}" + {{- if .access.bufferingsize }} + - "--accesslog.bufferingsize={{ .access.bufferingsize }}" + {{- end }} + {{- if .access.filters }} + {{- if .access.filters.statuscodes }} + - "--accesslog.filters.statuscodes={{ .access.filters.statuscodes }}" + {{- end }} + {{- if .access.filters.retryattempts }} + - "--accesslog.filters.retryattempts" + {{- end }} + {{- if .access.filters.minduration }} + - "--accesslog.filters.minduration={{ .access.filters.minduration }}" + {{- end }} + {{- end }} + - "--accesslog.fields.defaultmode={{ .access.fields.general.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.general.names }} + - "--accesslog.fields.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + - "--accesslog.fields.headers.defaultmode={{ .access.fields.headers.defaultmode }}" + {{- range $fieldname, $fieldaction := .access.fields.headers.names }} + - "--accesslog.fields.headers.names.{{ $fieldname }}={{ $fieldaction }}" + {{- end }} + {{- end }} + {{- end }} + {{- if .Values.pilot.enabled }} + - "--pilot.token={{ .Values.pilot.token }}" + {{- end }} + {{- if hasKey .Values.pilot "dashboard" }} + - "--pilot.dashboard={{ .Values.pilot.dashboard }}" + {{- end }} + {{- with .Values.additionalArguments }} + {{- range . }} + - {{ . | quote }} + {{- end }} + {{- end }} +{{- end -}} diff --git a/stable/traefik/12.0.5/templates/_helpers.tpl b/stable/traefik/12.0.5/templates/_helpers.tpl new file mode 100644 index 00000000000..ab55e4e7ec6 --- /dev/null +++ b/stable/traefik/12.0.5/templates/_helpers.tpl @@ -0,0 +1,22 @@ +{{/* +Construct the path for the providers.kubernetesingress.ingressendpoint.publishedservice. +By convention this will simply use the / to match the name of the +service generated. +Users can provide an override for an explicit service they want bound via `.Values.providers.kubernetesIngress.publishedService.pathOverride` +*/}} +{{- define "providers.kubernetesIngress.publishedServicePath" -}} +{{- $fullName := include "tc.common.names.fullname" . -}} +{{- $defServiceName := printf "%s/%s-tcp" .Release.Namespace $fullName -}} +{{- $servicePath := default $defServiceName .Values.providers.kubernetesIngress.publishedService.pathOverride }} +{{- print $servicePath | trimSuffix "-" -}} +{{- end -}} + +{{/* +Construct a comma-separated list of whitelisted namespaces +*/}} +{{- define "providers.kubernetesIngress.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesIngress.namespaces) }} +{{- end -}} +{{- define "providers.kubernetesCRD.namespaces" -}} +{{- default .Release.Namespace (join "," .Values.providers.kubernetesCRD.namespaces) }} +{{- end -}} diff --git a/stable/traefik/12.0.5/templates/_ingressclass.tpl b/stable/traefik/12.0.5/templates/_ingressclass.tpl new file mode 100644 index 00000000000..909e249d6a5 --- /dev/null +++ b/stable/traefik/12.0.5/templates/_ingressclass.tpl @@ -0,0 +1,24 @@ +{{/* Define the ingressClass */}} +{{- define "traefik.ingressClass" -}} +--- +{{ if .Values.ingressClass.enabled }} + {{- if .Capabilities.APIVersions.Has "networking.k8s.io/v1/IngressClass" }} +apiVersion: networking.k8s.io/v1 + {{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1/IngressClass" }} +apiVersion: networking.k8s.io/v1beta1 + {{- else if or (eq .Values.ingressClass.fallbackApiVersion "v1beta1") (eq .Values.ingressClass.fallbackApiVersion "v1") }} +apiVersion: {{ printf "networking.k8s.io/%s" .Values.ingressClass.fallbackApiVersion }} + {{- else }} + {{- fail "\n\n ERROR: You must have at least networking.k8s.io/v1beta1 to use ingressClass" }} + {{- end }} +kind: IngressClass +metadata: + annotations: + ingressclass.kubernetes.io/is-default-class: {{ .Values.ingressClass.isDefaultClass | quote }} + labels: + {{- include "tc.common.labels" . | nindent 4 }} + name: {{ .Release.Name }} +spec: + controller: traefik.io/ingress-controller +{{- end }} +{{- end }} diff --git a/stable/traefik/12.0.5/templates/_ingressroute.tpl b/stable/traefik/12.0.5/templates/_ingressroute.tpl new file mode 100644 index 00000000000..7f012c92350 --- /dev/null +++ b/stable/traefik/12.0.5/templates/_ingressroute.tpl @@ -0,0 +1,25 @@ +{{/* Define the ingressRoute */}} +{{- define "traefik.ingressRoute" -}} +{{ if .Values.ingressRoute.dashboard.enabled }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: {{ include "tc.common.names.fullname" . }}-dashboard + annotations: + {{- with .Values.ingressRoute.dashboard.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + labels: + {{- include "tc.common.labels" . | nindent 4 }} +spec: + entryPoints: + - main + routes: + - match: PathPrefix(`/dashboard`) || PathPrefix(`/api`) + kind: Rule + services: + - name: api@internal + kind: TraefikService +{{ end }} +{{- end -}} diff --git a/stable/traefik/12.0.5/templates/_portalhook.tpl b/stable/traefik/12.0.5/templates/_portalhook.tpl new file mode 100644 index 00000000000..e3586c5d4e9 --- /dev/null +++ b/stable/traefik/12.0.5/templates/_portalhook.tpl @@ -0,0 +1,26 @@ +{{/* Define the portalHook */}} +{{- define "traefik.portalhook" -}} +{{- if .Values.portalhook.enabled }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- + +apiVersion: v1 +kind: ConfigMap +metadata: + name: portalhook + namespace: {{ $namespace }} +data: + {{- $ports := dict }} + {{- range $.Values.service }} + {{- range $name, $value := .ports }} + {{- $_ := set $ports $name $value }} + {{- end }} + {{- end }} + {{- range $name, $value := $ports }} + {{ $name }}: {{ $value.port | quote }} + {{- end }} +{{- end }} +{{- end -}} diff --git a/stable/traefik/12.0.5/templates/_tlsoptions.tpl b/stable/traefik/12.0.5/templates/_tlsoptions.tpl new file mode 100644 index 00000000000..3e5aad3bee9 --- /dev/null +++ b/stable/traefik/12.0.5/templates/_tlsoptions.tpl @@ -0,0 +1,12 @@ +{{/* Define the tlsOptions */}} +{{- define "traefik.tlsOptions" -}} +{{- range $name, $config := .Values.tlsOptions }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: TLSOption +metadata: + name: {{ $name }} +spec: + {{- toYaml $config | nindent 2 }} +{{- end }} +{{- end -}} diff --git a/stable/traefik/12.0.5/templates/common.yaml b/stable/traefik/12.0.5/templates/common.yaml new file mode 100644 index 00000000000..d078b251c20 --- /dev/null +++ b/stable/traefik/12.0.5/templates/common.yaml @@ -0,0 +1,24 @@ +{{/* Make sure all variables are set properly */}} +{{- include "tc.common.loader.init" . }} + +{{- if .Values.metrics }} +{{- if .Values.metrics.prometheus }} +{{- $_ := set .Values.podAnnotations "prometheus.io/scrape" "true" -}} +{{- $_ := set .Values.podAnnotations "prometheus.io/path" "/metrics" -}} +{{- $_ := set .Values.podAnnotations "prometheus.io/scrape" "9180" -}} +{{- end }} +{{- end }} + +{{- $newArgs := (include "traefik.args" . | fromYaml) }} +{{- $_ := set .Values "newArgs" $newArgs -}} +{{- $mergedargs := concat .Values.args .Values.newArgs.args }} +{{- $_ := set .Values "args" $mergedargs -}} + +{{- include "traefik.portalhook" . }} +{{- include "traefik.tlsOptions" . }} +{{- include "traefik.ingressRoute" . }} +{{- include "traefik.ingressClass" . }} + + +{{/* Render the templates */}} +{{ include "tc.common.loader.apply" . }} diff --git a/stable/traefik/12.0.5/templates/middlewares/basic-middleware.yaml b/stable/traefik/12.0.5/templates/middlewares/basic-middleware.yaml new file mode 100644 index 00000000000..144f94e7333 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/basic-middleware.yaml @@ -0,0 +1,65 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: compress + namespace: {{ $namespace }} +spec: + compress: {} +--- +# Here, an average of 300 requests per second is allowed. +# In addition, a burst of 200 requests is allowed. +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-ratelimit + namespace: {{ $namespace }} +spec: + rateLimit: + average: 600 + burst: 400 +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: basic-secure-headers + namespace: {{ $namespace }} +spec: + headers: + accessControlAllowMethods: + - GET + - OPTIONS + - HEAD + - PUT + accessControlMaxAge: 100 + sslRedirect: true + stsSeconds: 63072000 + # stsIncludeSubdomains: false + # stsPreload: false + forceSTSHeader: true + contentTypeNosniff: true + browserXssFilter: true + sslForceHost: true + referrerPolicy: same-origin + customRequestHeaders: + X-Forwarded-Proto: "https" + customResponseHeaders: + X-Robots-Tag: 'none' + server: '' +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: chain-basic + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: basic-ratelimit + - name: basic-secure-headers + - name: compress diff --git a/stable/traefik/12.0.5/templates/middlewares/basicauth.yaml b/stable/traefik/12.0.5/templates/middlewares/basicauth.yaml new file mode 100644 index 00000000000..ccb541742f0 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/basicauth.yaml @@ -0,0 +1,34 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.basicAuth }} +--- +{{- $users := list }} +{{ range $index, $userdata := $middlewareData.users }} + {{ $users = append $users ( htpasswd $userdata.username $userdata.password ) }} +{{ end }} + +apiVersion: v1 +kind: Secret +metadata: + name: {{printf "%v-%v" $middlewareData.name "secret" }} + namespace: {{ $namespace }} +type: Opaque +stringData: + users: | + {{- range $index, $user := $users }} + {{ printf "%s" $user }} + {{- end }} +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + basicAuth: + secret: {{printf "%v-%v" $middlewareData.name "secret" }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/chain.yaml b/stable/traefik/12.0.5/templates/middlewares/chain.yaml new file mode 100644 index 00000000000..f87994f7956 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/chain.yaml @@ -0,0 +1,21 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.chain }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + chain: + middlewares: + {{ range $index, $middleware := .middlewares }} + - name: {{ printf "%v-%v@%v" $namespace $middleware "kubernetescrd" }} + {{ end }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/forwardauth.yaml b/stable/traefik/12.0.5/templates/middlewares/forwardauth.yaml new file mode 100644 index 00000000000..7a3e32fdbf7 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/forwardauth.yaml @@ -0,0 +1,30 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.forwardAuth }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + forwardAuth: + address: {{ $middlewareData.address }} + {{- with $middlewareData.authResponseHeaders }} + authResponseHeaders: + {{- toYaml . | nindent 4 }} + {{- end }} + {{- with $middlewareData.authRequestHeaders }} + authRequestHeaders: + {{- toYaml . | nindent 4 }} + {{- end }} + {{- if $middlewareData.authResponseHeadersRegex }} + authResponseHeadersRegex: {{ $middlewareData.authResponseHeadersRegex }} + {{- end }} + {{- if $middlewareData.trustForwardHeader }} + trustForwardHeader: true + {{- end }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/ipwhitelist.yaml b/stable/traefik/12.0.5/templates/middlewares/ipwhitelist.yaml new file mode 100644 index 00000000000..1179245017e --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/ipwhitelist.yaml @@ -0,0 +1,33 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.ipWhiteList }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + ipWhiteList: + sourceRange: + {{- range $middlewareData.sourceRange }} + - {{ . }} + {{- end }} + {{- if $middlewareData.ipStrategy }} + ipStrategy: + {{- if $middlewareData.ipStrategy.depth }} + depth: {{ $middlewareData.ipStrategy.depth }} + {{- end }} + {{- if $middlewareData.ipStrategy.excludedIPs }} + excludedIPs: + {{- range $middlewareData.ipStrategy.excludedIPs }} + - {{ . }} + {{- end }} + {{- end }} + {{- end }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/ratelimit.yaml b/stable/traefik/12.0.5/templates/middlewares/ratelimit.yaml new file mode 100644 index 00000000000..144b9d8bf38 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/ratelimit.yaml @@ -0,0 +1,19 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.rateLimit }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + rateLimit: + average: {{ $middlewareData.average }} + burst: {{ $middlewareData.burst }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/redirectScheme.yaml b/stable/traefik/12.0.5/templates/middlewares/redirectScheme.yaml new file mode 100644 index 00000000000..f2413f84e19 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/redirectScheme.yaml @@ -0,0 +1,19 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.redirectScheme }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + redirectScheme: + scheme: {{ $middlewareData.scheme }} + permanent: {{ $middlewareData.permanent }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/redirectregex.yaml b/stable/traefik/12.0.5/templates/middlewares/redirectregex.yaml new file mode 100644 index 00000000000..46e3e724dd6 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/redirectregex.yaml @@ -0,0 +1,20 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +{{ range $index, $middlewareData := .Values.middlewares.redirectRegex }} + +--- +# Declaring the user list +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + redirectRegex: + regex: {{ $middlewareData.regex | quote }} + replacement: {{ $middlewareData.replacement | quote }} + permanent: {{ $middlewareData.permanent }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/stripPrefixRegex.yaml b/stable/traefik/12.0.5/templates/middlewares/stripPrefixRegex.yaml new file mode 100644 index 00000000000..007c166ff39 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/stripPrefixRegex.yaml @@ -0,0 +1,20 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} + +{{ range $index, $middlewareData := .Values.middlewares.stripPrefixRegex }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ $middlewareData.name }} + namespace: {{ $namespace }} +spec: + stripPrefixRegex: + regex: + {{- range $middlewareData.regex }} + - {{ . | quote }} + {{- end }} +{{ end }} diff --git a/stable/traefik/12.0.5/templates/middlewares/tc-chains.yaml b/stable/traefik/12.0.5/templates/middlewares/tc-chains.yaml new file mode 100644 index 00000000000..409766daa89 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/tc-chains.yaml @@ -0,0 +1,29 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-opencors-chain + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: basic-ratelimit + - name: tc-opencors-headers + - name: compress +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-closedcors-chain + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: basic-ratelimit + - name: tc-closedcors-headers + - name: compress diff --git a/stable/traefik/12.0.5/templates/middlewares/tc-headers.yaml b/stable/traefik/12.0.5/templates/middlewares/tc-headers.yaml new file mode 100644 index 00000000000..330fbe4467a --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/tc-headers.yaml @@ -0,0 +1,64 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-opencors-headers + namespace: {{ $namespace }} +spec: + headers: + accessControlAllowHeaders: + - '*' + accessControlAllowMethods: + - GET + - OPTIONS + - HEAD + - PUT + - POST + accessControlAllowOriginList: + - '*' + accessControlMaxAge: 100 + browserXssFilter: true + contentTypeNosniff: true + customRequestHeaders: + X-Forwarded-Proto: https + customResponseHeaders: + X-Robots-Tag: none + server: "" + forceSTSHeader: true + referrerPolicy: same-origin + sslForceHost: true + sslRedirect: true + stsSeconds: 63072000 +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-closedcors-headers + namespace: {{ $namespace }} +spec: + headers: + accessControlAllowMethods: + - GET + - OPTIONS + - HEAD + - PUT + accessControlMaxAge: 100 + sslRedirect: true + stsSeconds: 63072000 + # stsIncludeSubdomains: false + # stsPreload: false + forceSTSHeader: true + contentTypeNosniff: true + browserXssFilter: true + sslForceHost: true + referrerPolicy: same-origin + customRequestHeaders: + X-Forwarded-Proto: "https" + customResponseHeaders: + X-Robots-Tag: 'none' + server: '' diff --git a/stable/traefik/12.0.5/templates/middlewares/tc-nextcloud.yaml b/stable/traefik/12.0.5/templates/middlewares/tc-nextcloud.yaml new file mode 100644 index 00000000000..6a3019d56c5 --- /dev/null +++ b/stable/traefik/12.0.5/templates/middlewares/tc-nextcloud.yaml @@ -0,0 +1,25 @@ +{{- $values := .Values }} +{{- $namespace := ( printf "ix-%s" .Release.Name ) }} +{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }} +{{- $namespace = "default" }} +{{- end }} +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-nextcloud-redirectregex-dav + namespace: {{ $namespace }} +spec: + redirectRegex: + regex: "https://(.*)/.well-known/(card|cal)dav" + replacement: "https://${1}/remote.php/dav/" +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: tc-nextcloud-chain + namespace: {{ $namespace }} +spec: + chain: + middlewares: + - name: tc-nextcloud-redirectregex-dav diff --git a/stable/traefik/12.0.5/values.yaml b/stable/traefik/12.0.5/values.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/stable/trilium-notes/5.0.1/Chart.lock b/stable/trilium-notes/5.0.1/Chart.lock deleted file mode 100644 index 5847b4feca2..00000000000 --- a/stable/trilium-notes/5.0.1/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.0.10 -digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc -generated: "2022-06-14T14:51:28.219847594Z" diff --git a/stable/trilium-notes/5.0.1/CHANGELOG.md b/stable/trilium-notes/5.0.2/CHANGELOG.md similarity index 90% rename from stable/trilium-notes/5.0.1/CHANGELOG.md rename to stable/trilium-notes/5.0.2/CHANGELOG.md index fa9126168a9..bb6dae41266 100644 --- a/stable/trilium-notes/5.0.1/CHANGELOG.md +++ b/stable/trilium-notes/5.0.2/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [trilium-notes-5.0.2](https://github.com/truecharts/apps/compare/trilium-notes-5.0.1...trilium-notes-5.0.2) (2022-06-15) + +#### Chore + +* update docker general non-major ([#2890](https://github.com/truecharts/apps/issues/2890)) + + + ### [trilium-notes-5.0.1](https://github.com/truecharts/apps/compare/trilium-notes-5.0.0...trilium-notes-5.0.1) (2022-06-14) @@ -88,12 +97,3 @@ -### [trilium-notes-2.0.20](https://github.com/truecharts/apps/compare/trilium-notes-2.0.19...trilium-notes-2.0.20) (2022-05-26) - -#### Chore - -* Auto-update chart README [skip ci] -* update helm general non-major helm releases ([#2759](https://github.com/truecharts/apps/issues/2759)) - - - diff --git a/stable/trilium-notes/5.0.2/CONFIG.md b/stable/trilium-notes/5.0.2/CONFIG.md new file mode 100644 index 00000000000..c147b7c819c --- /dev/null +++ b/stable/trilium-notes/5.0.2/CONFIG.md @@ -0,0 +1,7 @@ +# Configuration Options + +##### Connecting to other apps +If you need to connect this App to other Apps on TrueNAS SCALE, please refer to our [Linking Apps Internally](https://truecharts.org/manual/Quick-Start%20Guides/06-linking-apps/) quick-start guide. + +##### Available config options +In the future this page is going to contain an automated list of options available in the installation/edit UI. diff --git a/stable/trilium-notes/5.0.2/Chart.lock b/stable/trilium-notes/5.0.2/Chart.lock new file mode 100644 index 00000000000..1041a0e0ea1 --- /dev/null +++ b/stable/trilium-notes/5.0.2/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.0.10 +digest: sha256:9f3c62e5207bf34631e3ba3f32ed1c823f1439d2d5ce6953f3ca1c6fb86fc4bc +generated: "2022-06-15T07:35:30.695993237Z" diff --git a/stable/trilium-notes/5.0.1/Chart.yaml b/stable/trilium-notes/5.0.2/Chart.yaml similarity index 95% rename from stable/trilium-notes/5.0.1/Chart.yaml rename to stable/trilium-notes/5.0.2/Chart.yaml index 14553edf624..a116b19afac 100644 --- a/stable/trilium-notes/5.0.1/Chart.yaml +++ b/stable/trilium-notes/5.0.2/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.52.2" +appVersion: "0.52.3" dependencies: - name: common repository: https://library-charts.truecharts.org @@ -23,7 +23,7 @@ sources: - https://hub.docker.com/r/zadam/trilium - https://github.com/zadam/trilium type: application -version: 5.0.1 +version: 5.0.2 annotations: truecharts.org/catagories: | - media diff --git a/stable/trilium-notes/5.0.1/README.md b/stable/trilium-notes/5.0.2/README.md similarity index 100% rename from stable/trilium-notes/5.0.1/README.md rename to stable/trilium-notes/5.0.2/README.md diff --git a/stable/trilium-notes/5.0.1/app-readme.md b/stable/trilium-notes/5.0.2/app-readme.md similarity index 100% rename from stable/trilium-notes/5.0.1/app-readme.md rename to stable/trilium-notes/5.0.2/app-readme.md diff --git a/stable/trilium-notes/5.0.2/charts/common-10.0.10.tgz b/stable/trilium-notes/5.0.2/charts/common-10.0.10.tgz new file mode 100644 index 0000000000000000000000000000000000000000..b39f3b3a8f32cdc206c3bbba091c49a15329f972 GIT binary patch literal 46486 zcmV)>K!d*@iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYcciT9UC_aDdQ{cy>x9z#s)0XXMCv(^BB;7uphmY-~@9yjz z2O=Q}V~S)0pd3v)-~D&+BtU`^Q;g!A}M zcmMQyz25%bp7^)d>y`iQ?e7l$)ZZHn2ff|hUa$YBUVpGR?EMM!?g5v|lT!xCpL(}$ ztK7NoluqP&C$RYfRhXMXL=|GgtW-nXdl$ z*XR9Cf4|df_kL{6Ax;>?2_ga*nnN6q08S?9e-(f`DVeqaNFeX8MF0SD5*O%~D#+pr z1Gdc2NTb(UXk7ZePOsDNwH{{t)%;(;I7jrJ1i;Gq-|z43?j4lp|3UxYasEHV^8~cp z;9Z8252tSd%}|IZI0RvuOz<=(kk9qj6YyUVn!r3}yzn_fV2tAQx|L=qS!Bt{98S@w z1%QBcE?_JHn<1bIfH1}=VF2@jEdU70Qi@qhmLo8og`|U1TRx~-ZCR@+T)-fokPJ?> zVQ+VTIOwBswANeDM6HXs3oBNh6(yPha}pR z>erZ{DX&;h_X2i9k{g%}pxK08^gF%Ipf~9Ep7r-My$8Miv%SOUU~h2P+Z*=#!~XuW z-a)wA?}y{TV2@LIZx=?peKeRva1tFJ^arpP!QChvKZA#ZCOB+F>Wrjw264P8rFFe} zLL0~p>8#7IhviUt&>41mn!E=CGzkx)gZ+MV2zU4381C;6hPwy7sNd@!^w4hDkI-Z? z8KZ+f97KEl5I!3m3_~;+JnIdfd55^v_D0lA5Tmm+Wt&o0*Q=+lf!vU~y8L=r^}=G% zA5R9m`;as7;j?f!9uJ3m2jkv8I_w?pjt3C!!?3>_A;j5rFh-Le?DzU`+#62%z1_nG zZP!!xD87bEs^}V~5u%7J5ZRQnMa_EJ@-l4&z9D(7DvcmIEWFp*D_FR{J3c( zgJ-+r$=+~qa2TOyhbSB$?xOLqH`$F2_a_t78y+5v_a<->?MLBY_$=DpKY)8)7OpnG z5f{Ta!wK4y(y~@Pm5(IUh6I+-*1>Vey4&dwI|IYK&rr0xci4kHg!XnP2XL}~*q@+i z80}5ML4P>x@5Aw=AMW)LjL`nG-NW%5c(}W^>CMD$O4*bk`upaB*VJ4g zdJE`Hg|Dg61fHwr_By)-`wrp3!Tu0MFd8519>U@N!SG=CtQQ^b?e6st4)^=f;9!4n z7*2-!6EqnQhG@5Uc+i^+QE%^Hf8aGJD$Q?1>NzABM&nKCtg6)$S;K8eVO4xBB$u|m z&Oyf*4+oQj@v}p8*pK$2@$j&BINlw?{$RMjxBu+muzwhZ@L)1H-0L0g_j{A!AsS5J z-tPW*98P+ZF&eIKdo#kO$uzwIVP&-ygjH~x5>^&p3&|nuu+!^2Ge&U#V0aj!XfT9u zaCk7-h2uRGKAVi6!Qlbw?~mbd{49cl-Di7IICzG*8GHzz4F|)+-QnJ(zrN|Fbe+cO z7{&!v5Cbp)=>idgBP1LO(j-9>{0XEJ@oSRDF<(5ZCHFg3+JVB$p@dUmF2~MyW zCtv`0Yr-fJ4weP9eJD2$B6LR z6(NcVia?e|R0^UPhmejye+2{O*_6Nt0m=wuXu1?dU!?@RFv!py-Ul4Xo=Dz0Lm@$s zA+V*S<~D#y1kTbp#>w=37D1-?lEXSzy*Wo-VDFL_C`JrbK@{L6uor?991OtIBqe<6 zV9LK~{Q1-(HVFR0>V84vQcH9A3FHY}KpgX_Cu&*0HvvO)GL-yX9V6~9Jg8-WZ~>2Ng19jl_F_5VjvR@E`gwPY&HPi9-YgUTk=C$TTM}d zq}8N#x&k0AsyWPT1vY^(H8Rgo^%Sxh$SEKH8P}ozg~B`^rWoU(KdPEJK#UUmff&jy|T{$Xc-zq9WJ3GS7r`W3zZj$Au`7aqTqUlIH8M~B&Q6o3P_$%aE;jvTwMIO=B7@Iv886I z8-k-O!bt&8{B%Kz`3rtY3H~RC6ob<=0!KMZX$WIPN=t>mM3@R#e{Ic7mD4mTD)9L; zhd7aXpfWKOKUx~)3MY}6T98bI*5^g+HaRpwVE###`V}XUrD%lNtY)VyfFjq%YXH-N zH^&K{=W_t(X`V0+S(z6q0ZhSM8e%X3{SvetFz0R3 zTozy;P2y#xlz;)r6^a0)8ZX(9`k~cVVMxhUyfy2g1_~6N0G*|I9PuTYv{fVD{3}3O zl9P`ij3TYHOMpd{%IeO*xtJkm`jydQDPJO5bWBnvtO0KQDyy0g5y{aGfD#m@TI-@n zX*zo?Z5E*dsFd14;4%>e$8k;>B4=qVEp6-fPdJHiGOcATGKOJehT?^9%SIeV9rFnI zo3qSIG4PZxfR)IWXg46sO1|N$@2IMeEij^NSp2qiq65a&perC$wEPCx=uVYks`r~C zXH%&PZ#AlCxfl|EhY9~!s`LU)gtFIcO7rnQP{_&>Ddv89Yi36=^P@<^p?c0& z`=`O-B#iS&F%KN43nO33f?BQsC0xq_I#!NHv7L0Ck}J7vGFHFv6aqdgI;*zaikhC8 zS;y>7y%l^dt!VsDRV_;+vyRhCaziR^z{{8%Kvki(WEKU?sy(vE&LwP006}w3Lq!C( z%ncbVcCWpVESr2bVe+VZ!Y@uKR5@M8r*T?0tl@-YrEk~QT!<-uuOOQB#b#okjT z2O~^S$l@h{jKOfGtWT~^)M5@N43P;8#n_(42vRdYLS& z>H7wX^}_;_G!f>yS-Wt`r-*VUnUHG(w^B->j^m826~bH1pKrOPLIyde|s?k zKYsoUI%h~QMTg5N@a4;otta5v6ltm6%a!&UnEi^DXJ}&HYvnJ$x92cxo0Xe*uF!JC z|D#{OsDKu$x>qEfTR2R97+%~Jri~n(2)?|6LqJ*DLNRJXq z76O00iZ#Ttu&*OiTXm*V)b3-+I2R0)D)nImz=Wi8;mOimWbIRk8gHeGSotv8MIlFo zb5Zm{N^oUOO8(@~$A~lX3ggzXNnyxx7=s8h$OY0EfjEVcFw%^jD_}zkC?hzTzJLrW z7{@Tt>uSKVSR0&L?Q@{EhLb*+jNp`Dwgh1esdS(fu0F=m7V~E;_n>GvLs8Bb*t*^^ zuO{_1SK~{{(7c_b5o(773uld9u}jyY+}c|@ejo!?jAP6EG+^QN)ioqhJA%m+ku<06 z0+BlC=o4S;VJ2j!Fu*AiQl<3-WUfq?YGF(eyrRNu0;V~Z)&u0Erun>ZDRP0YK~g?b z^bfrt{B4F3?KVp(dn>iMWhXDwT&yLcgldJFf{)6WdBug=Z^?B437P!gq#Dj^Hz za0v*aX}mxnp>djC zQI5n?pTi<34MT}b(TdRbqJvU5@~Lf;dHE)&!r_zyn?qVnQx$@+Qa+>H~iWfhVG|%*#iTji0Sr#MC3NRKQG-Ii9$1^Sk z^@MzvoTVvygXtWyaJCuN!kt)bkz%C05}ESrUG$OEi8?QGbXD?CB_pJF2fkrb<7m7)Zc|LIxRQ!HI8G>Z6r^2 zxO#;NzzJri#14Rf&kjC+@f-oj08S`_aV&fuotFA#c6;a@w}$vy1w~kd2jp@$QgOOi z*mYWJpV*6mjwFG}QnXYQ602B_12=@Y7$-}B8Jg1$c*&b|N^6JR3@#ABT$*1e+jGg#gS%e*;y6BQQjDL zsAf5OrEMCckf8{C)RYt>u_MuxZOqa*q8g%#`_j_L3%ibUfWUmDOe+Bi#xGC|m**%< zlZcK$zo))th+v^)OYgaaOmk*F4AuJy#Bom0#f%`z5$0ctIE@J68}YiCW`1TjpYMg+ z4fIEL--O*=vfVMi`+ znFs3qlPA*EK1VR205dS-b~2d5Phwj?oq*w=cYDwK!yaE1^16bJIF=yKz!*(Z!fiP* zE2w`))lZ!LUaKW7R_Mg{xl0c*wvd7A84hQ1yBEj8=TN+H7b8DXV1Wg5L@AsivmUr6 zm@$-ebaT>9TxBK_B%F02vOcz9hP!;#AEz*C6GYRTgot*z3AyNZpO^(vyT8rXR|<<$ z&Voi@oFowr`66SMUN`SZv7w)(SU@X^lD(uuO;rLRL;yI2X(Yu;Ia+ds2gISC9 z279oohDW6}4Ar@#7@al2IX4KgaAGQ@Up${o@Fxjg>oz%bm^y@TPjq-d8ZD%DlBFgv zA;6W$0z34ED_-^0Y%HJSc^0Fs*C~v~FosEp$o3B4KYvm`ceFeDu$>d^kOrrK^cyEH2lGY-K4h=p9LG!TAhtl10^o24CcG%tJ6(nD7S62#jg!;G-VXoozTE`Y zdmNromwx94!)<8;F}^oe1$?M1RnUl;w1HYEg|&(y)AFT8Gpx}Lf);C3g9Yb?+Cfsh zRyEY92ZuQXh(w%QD(a+!jY?&?yyg91X_&?x>)Uyr2^iKHqK|xi^l?Z2d(Qv3I6hSd z;QJS+AMNULDaAjjMO6l`69Df|em)UwPP2BVvC zVh)H&-?gwMj)M7?eNkcGtqu)hiT5mhH0JSM~+nrCd$;ly$@C4q$Vy0rKc_9kc{)yFwuQbb_PaTLYZkRW>mU*S(Edc(gU@u@-?F`LqftS!rEsm2II z6MSWVxjLjW%p!v!(qaD`VRITxL6*^8Vl%Zcu?q^=FgcZAmLa~D=kWP&)pXI8iJmQL z%8#nO;xM2YNhjFA;9AVYEgc83?V!VPOmha%r!1u=@=>*plBk_irH3bF+A0~==CdCs z?J=Y{bmOLV+y4?&pWAGug9Erp@(gqCcYGt zRHFV%O2t`Efs`9xpf$7zFSjf%c}P}h__hj1?Zjry>P0GpY*rw}0TlKx|5U7a3d~L+ zn{_}llz`c_=sNGD_gLtPh}+BDq_pyXg1|MKJ0^McFZyqp>t-x$kk~fA`DN&&VUgzKpdhyMua*0 zelGi)g9AP$E*rQR=M~C0g;$u~?^R@=I*|txTdeRtAQ?!<)ttnh!x85}xsrW<{u79h zJi2i!JKn;!YRk(OYEAiOJ-sjFO09b_G_m;&RvK2>n=UmZh#yt7e*Id*WHR9F6`Jtf zHR}z7pl`)tYRdz5r6Zs}7R2TU6Ot9&vWeVs!f9ct`#D%jpj1h#i3D z8C$-GXBcl}LxDp)F&m5lgE<9v?vip|}O*95kYgnaD&g`;zsPA=IDUCQcz z{kWrws$&|wMiJPu(AeGqN$OM;MyLot5*xvMvdmKBpYWkC8?j-?#Z%knZ55An4P~MQf^u;( z37}7y3YH9Gi03=SD60S@^PSH$XH8=5DCt7S9ENCondYP|Kw3DwS1!XaP5z-TSr9IZ zj}Cy39V?3k1T-JFWjI$tH6NOlKvc|7?SmJQ`ss6y zd@5y-z&T=w=v5eJMJH9(4j+j$L&?jZ&h@z`ZsqZRE46=8Vd4$6*EuH?G()uBdv@pepGbcENwoe!QtTs`AjtTrPgNosMUNdJ zSVO4u8qs1W6aQ0+jky2^RBzM}6jMXxA_PxBUrvzkf;AS9#OajYkT({Pbb0kh?s#DC zkg^)hvs7Geq-e8pqM_@F@Y#XhIoExadMvPdt9{B^F^?P9wJ zJSiO5Bl8Mq-<))*>C%I8DU$%9ko*KT=+iOi&OP6)GT0u8xO zpweQgVG{M_hqtO*MZT~{{;lUf;dCim0d% zQ6_9t5NU4vk}ZNd!sFoJz$@+4aLIk*>S&4gMck9fGni9E%nlha(L?iPdrHzg>&};L zQ^d=l$%HoG&SXLxvSu=&x93Zl{j0dZpfBzdUQd17g5w=Ccl{M-!D%{2{O{nA&sT`D zH5)qCrA__~M0kNCk$(}>D}4)!$bdu{OhVLYNgT!2kWM2?RSruLhau8Y z+71T(R=l*gI09#nBM{%^zJyp|KY0S)5g<0jK#VD~u6f{V^gOGyV!bw-Ol*eE<=-2$ zKlmBTU(OC*I72XNt9NY?xT>iBmP-)1zr+b1rU_*PVvzuUBZEh#bHvHCjTSPrqzfs< z(?p~_O40~*pCsa%h%+%u3n!VYdgDZTO;FRVwP6yqVZv}* zzu9i-zdT5?G)v=jx;)P~QyMz!c+Cz!fwwjg)dl^R?Vjj3GrPm`hpsC}9N4w_U`-u8h&-)XFk0IZsY? zaIY*>qzk=+B#tnO+6sX-O9c-i7PbWrZ7%V|pKT~H?{2rOewcB^nU#{c-|6>yQVJMM zr6g;EK!<6D={(TyuCK2<&U-f#q)t_!H)Sd4%B!zvO@h8o%VakgwZIeb8v;4a#Wg#Ap z6NU)*v7qsf;xRf3w3E3*LgCjzKo*aR@?#+81w$O#RZfq^`i_|FV=Gs(IXEq|f9iZnGICk_ld}X+9H9_e7m!(gUa>}V9K31?$a^KP zJ)Fo(5>14lz*sFZ7mi!bT=Dk}BkTkbgHjkVN*0CJuzIB&sKf#n7m`E*^J>htT0ILE zADc-mmvyrAD;%4%IMp3~@1EX`wndzMy+xMr|L<@V)Yl{xt68V*JKtT{e1D;`!@%hk zv^>f|30{wSu&?fyVp-^G85$@f>%Tp;&A0oG7|`GjUvxD_>5DPaf78GBeD@^G&G=4}*(ieC#Tr(%d4-mM!7D^LABEhA)5(Rb)@5sD9A4^hb>%=-Gm^jY_eN$= zmsUOcl!>cqu=Y4-@%I+v@$w#Zy#wPO`{^5kA} z*a*M`O-A5ubJ#cy*guM#Heh$Z-#d_eU?pg&@Ihh{ifq6L#gc!1mfnH#Cb3&>I;=ruGAxL>7sC22o+BIJY5k z4tsz0ns@tkdWFRY&K+(9(uGM0A(&@sj(tiKK-F?#t6s#ZKGkP3J}4`PSLpt^!wYzq z?5g9|EjYc+CPso7ou%>^rJfih%{dQ<*NM5TO5EvmjoC~X9j9q@XOlzYuxfG`Jnv&6 zVSwM|>@YxYG&@Y~dv-HCdD2pOz-h6`DAS;eGj!Z6lWlSoCc;^rFrAVqLK#Z9(S{M_ zpwz7_DP>#({T>$umX%vtY7VWNx||y-0#BbFH1=0C4hf2ApqV~&@3ay*$6x{wq)R34 z1!E;CL+UK``?J^Q>OyKuC-5 zs@SY!s_+AMElsBBjk+c)Htd=#{7_x{)8pfRq`K>x%cQzui>!NDy*RkTviN3g^m@JC z{@$MWx7X{H|Lq;@_W#u18w>}%-Q8ZV|EJ!d*BkEt3H0u|v%V*%43adK|rtABYPV3Lz zFJD@pKbsh|fQ22&fgQ00+o`f$0NSb!o&eDKAnl-OoQ`4K!Jm%#ic4Q3s0tF8Oc8jB zlL&p<0Z*|&boAU*#-CnRnsIKT1{_km-EP4Qt3}rc1XqW&6DGJ5CgFrH8W;Vbb%m2? z1k^s%k+{8^8zwJI{@d0ZF(@Okbf7c-)c*V#JT2cvEM5wndF%SN5|u_s++M7D^5x5q zqMIm*bdO7aa*8z^|GN3ljb0eve9qg?n)$zXaB$$x|Nd~ecknp>AL3ax86^)m6R?;< zzKLfQkacT6bd-gl3p`aRYxSn{=()(Ftt*);EN~)rer;T1JnrNS$GT8QfeJupy9{3V z!xZdNlO4ItYt{lUTC}qj;gEqqE-`{K;O%Wgz^6Ew65hU?=7yL$ZSWOZ(#qREq=(#s zBDN7n&q44sNh5TLv!Ljw>fqkquGM$xcobEHug@wE*-X6e7VlKUB~W@CWgouqg`WM! z9#Fn?a^&!obYw)@7wtsTOu=7YWO4C*lKUF6(6;yo)WURr`enNun#w}+Q8Q0fmRvcVXK8xHA*xHWgGE08!LdG56WHwrMU9~77fKje zW+^u`c*m~MSom#FwQE*MLoK`db8opaA*%vO^;$>>3$i^Kp0BE-8&NFjp^rUhwv-5{ z7VC&Sdv=euZ7wMxbOSgm*b7ep`d!V1@=UP4mjtJ{-!9PG4S|ELLerMN9kYQ^MrVB^ z_9n;rhBAL6zGh^3EhvLuE-p?>5}**HN{R-a$?HlN2Qhoxs?w9i)a_2GF&eBKJUx0a ziNIEwOT}<*gDvmaT1-)rx*i};E25xgG6`vC(LjkrA7Js#1DKoNj{UvpD{I@x6_0H# zfws)Hjlcl-bh`K+fDZTrBzz7f4D9iSHN0ZGj;jYV9->on$H%CRKfv#K%G99CO+itI z54HPEc&f!W-fQQZ^i+Jdgz^uIQMdcUV)Vn}hecqaARCq7C7^8^)as={d6iIO|A&aM z?j`@P^w`{LA+W~&AM_7)OZNZ4;9&4*|3AdD%KqoW-;uEbauFbPwUrNAn6j0*B~KPi z@;K&y@j2GEMa4VeGEh>0xA99FM~H|*Ml8-C{S__i3kP=o#6ZJSoxig>I`hS5_ zsIHNY-3B+3_@|)0xXC#UwynhZbHXRZFfh2LL4 zYxMu_V1K`)|Mz$MyN~++As*rXKSPXQv_K+cttT?jo+Q~g6yxGWFtzq#VF2S!SB5&W4t1JiIQEN$@35f=m&cANu^DX>xv z6*OK)yCSajhQzb<-8V@Pi8>La^-LGwL?$4b75Azb`-p-uq$tu6z48_a zB|TP2QqfkYU^wsYv*b~$l-YgMev0m&!I8Muv2tplh=x^Br$tu$;*>oQ7%GQHQN!=< zDx=&n732z^tCIhQ^VoH8SzsOKm9ZGC&Q|dYM5Aq+P8EQTs#8QcQRp*sxsExSqfZ)$ z)Wi+})N!GPy)S{)?!Thr3Y^DfXSqXqD>`9~tg2TefG)zv-9c0(HtoX)li_gXSSskN z2hzSRD3C2&p(1=hv2dXMSAof=6o8=3UoSKMTApbRK(MfIQy6ToqFPj)3_7mDqSVT1 zrUM|{>1M`IeEd+DJ?r4q5Ud2LaXUb zMW{CyEa$S_jL$z=*>u=0apxk`(Ld|?TL$=89|W51YHZ8pP7#jd(n&?UwB1c)L)0y` zZ_i7qK$70J#i5F0WnT^@M-ySZDdad>O4M$lw%w`4UK&r+FNorZEoXu2x;0%oG!W*VXfa&RIeA z^JkLg8UKxv#mJ62SEtKX>lt0hR`W24Ol_gfieK`iw6%YW8PY+u7`^ z#wkr8jzMrL_A*T>I1ad595c7lWB5)6)`lplzeEbDl{6^@@L%nKrwi#ntMvWK)8WPX zFc@{NUqf=v+Z#ST)ge4LH56p9k8|E%=JF^yR}Y$(6z2~F1~px3gP`3O#sL5GR;UK5 zrCI<*0uJzp$(vvW42yB~nPgU;TPvxD+V^Gz&qdIe{Yk}Z=|$i`j(lk-@dTt~1-?_v ziUnNLax!B^)6#0i>~N)7(FwM+li`vyW!(;?v#v~#Ay!6>C&GykKzqqau&bzu?oz{-d{x0bFDM^#>LEueUqwJ=%W{@fiD0=a>ww#E^2_ zsj>cK*2T@NzluAs{QzRzb9}E+e3x%`zZ%W>n11JF1g`BDFT-KUZKSJxHam;CSVRptM|&R-47@A}nWeU4xKZH?R4E!M>8>(+2x zz8m{|0SI9R$2i6eBPAVS6cxF8-@d%KJbLlw6p8tH1r!M}_ z&T{#{!GF5xRiS^DY*-ce=gEP2w^4sSO?S^Re+79~M*KB2#_Q(4&ig9tKY8Enz1e?z z!$Eoe@9jO>e-H8)`_Im$Ji*h=eZCq%$1u#Q32aJRd4p-A`yxmDjIr!879pRPGA+cj-l0y~JtbM_ew1H?#f#MiTl|^e7|E`7 z**xo-@5QY|b+(8>F;1_rwu-_Sqr{{^)>$Vy-b_RQ(2&3kDH&k-xV@X$R(n&E&ZG_g zk&Z9TSUKh>5O=EK(1p+I$Y4PyS$bPsq7lzhTBMk_UGMVwM>_Vk!=KB`46@nfrCM>Q z93_D_hs(c>7o(BD;sbry$S9CqB)}y#B0bQKV_N z^;*At%(H;x^tE`s@nO%hi{egBeVVQ;?(3*$N#)=BfzOQ=uaRbCU`>$7?|NZ^J z@X`PCAWxnB_u=&IS1|n+S>jlIyiA0t(vu|{P;lomL#~2Gzk?vnP$EFBu2Jj!m&g=Q zfZsYX?OkJnra2^Qaa_})4ad`FC55Zk+*o9ZHZ(lQ6qnjt2~z)k+})2)=~*TJ)dc8X zO76V3_5YwZEZcvB!K3~6AWxnA*T;e6&;zXmpvhWNT2IHAGLTNZ>*^LvB2g21P8V?* zDxJ?0+-P&bh-LqhKh@`$?rFuZnt#9rzv=MC>wS9r#7?@q^sbXRJ?ffo;%OxR?>Ya+ z!Tv!x|3`oKG5_C#JeBjGcd-5I5s}62ulnfQ{8gXU?EN~Wnr!_#6>gX8V}rnN{pS3? z&oAG+d-4AD%MEsoIrYBJ4P(wicePinsBr(=#5J1?y!|U2$LH6Wg)_IcS0`sLe>-~p z+HNg)_cpMKoV|O0@$$0ol;|G}I{p1luhZ-H2SE$C_vFd@N+mICnBtR+$5S_s(#w<6 z#h#0qZ1(eKVR5MoMF&2*)C{>95y)lPE1`2^;_rKizh9z$|0dM0=hBo|cYImsX|bDAL=t&#-^y|sr1Ux^ zk)#Yt7OzM;m$3@cf;&SKE!j5q$!alg;a?4jumT_KP@Te?(V;U)P}DI6H6_(;{o?Bi zX0^N>&M+AtNhSV*+dH~ulVAs4HpUB-AWBb3Iu;E%FPg?XwAZw9KhYG8?7#cX|IynY zRQCV(29NiDKge@G`9I35#`aAUax@S(Pi=9tL1g#Sy2$Pir*AKh-e3GuxsFdLmnMR@ znb0+NC4J4+@T&Q5+|jr60Ir??2bKNb;qGJphX;A;{C~gcvA+`!pb{Bt<%YEZ;`iJ}j<0X~9z1+jw;P}7x}))LIR9_u0b1+-=~wQ5*xP-~|Meh`(f`HF zx&sf8cj^>AAoJPh1u`Gk_<>60ns|arRW|Vj4fhXA-XQtr*8ZSkQF8wB^yuv9;@z3! zG5Am0rEqe3arD#cm*F4az6zWjg3uiw9T`Qq)%i{IXz{d#_Ra{6Jf!cJBA zCEEY%`>Yz$Zofpk##C9)%-@9{2eHtyU#_RUe;bd^W>3Zb6L&jwFMml1{wLSn@o5?z z9Ac*cQUJj?&XJH*Li^4PQ-Cau05og? zQgO=%1#AWxfCPb%AjnYE$|+8!YQe}k4a9g%AX%<7BIW%evkcl7hCG#L!Z*5izNpOK zZhU3EsyoY|u3EsczFQYP>bqYuSPB!=_u2a|M6u8CJ2!r6K-Lv9sl_nO!3w znz~I&UT%5vnxeG}!Ezkwx{OslfP2&-m0{#Dj`O2Xj6Jp!t?m_{dafV|pl)o)a`Q$uaI`=KPLb7!hg$2f`0S>= z@b=^lnx|xWmz|jlh&Sm^16-Qf33dAa_E~?5XPy4GZ4lm2hr8z&Z>`Cz$05G~eeTkxs@2`^H`DD+vpAI+Ghk&B zgE=BoR9u-YwYQ~@A{?@9uQT7?@6%rY?QO?Skn62123y6dYrDEZSW*+U$iXB@nUKoO zFtp11(X3@B-=p7vYTciK`{k{EO zS^xJR^FKYzv$6g^QFq1Oi}p8Hir$g#SMWB}{PuOYx7PdRyLG<-t#4DMs`Kry4K%)m z;M0uYIV8(-b;a-KIha~I;QHoYuad^&PR?*#+*T(+l{Va;!kneAadLH!O(=b>T3E$8 z;C^K25HGN4kCuI&7;vGYLvf_sF_+@5`CbO~+}iuXpV~igZm0vYU9n<~ zQox^3^ae*!jIJS(;ydu8Cey6EDp$}#wiN$e0xYJ!0#s?!k?6cd8SZVp_8|J)+56i8 zVmkkqn9-H8W!hD+3$F4pA_-!Mh9n9Kr(t=2y&*aVmD@I4tdZRHQfV0Hbt70FmbrIC z<{J*iyxBO+R}I1Z7SykAzn1VDG*_j0NuYX$Ur5Wj^TJ51b@cLcY!#NF1s|1FlW0YQ z)YsT{rN3q0gFk}UD+r5fN)$?`g)(<*To$&de|U#Qb%WUFrl>d%0!AR3;49Phg0DI_ z?UFQS;yPwVmRX7uMgzwIU3{>w1HMLM5kRFQahf(`jks#Y=7CDY(8Ks!ZscIm`$l#w zmC?wn^PS|5yCPQ8ip7xvsRkpk?V2Yi$W27(A2B31&SxI!-|0}Iv0w$)CR0aY56e7X`e`8NO zXGjE}bj_ z1rj*_>;qfD41h5VuTT<=oR{m7kk=Ssd%IFUh33V4^OE2&`|L^{wbpK!fV0Zs9|L=o5 z!vFh|XZJ`4zyt5?STulMjOzRCpPJM;58+`6H+*Qt9qKHnh$61dl*f^PXt`5aAV9~ExT2;~bRu@>`*FLabretY! zj$#zDl#HrN2ZOL%43t8vy$YnpZU+?5y<<_4 zIcCK#cd$fB`L};DVwdByr*d5sOMxSes1U>xXmNpbWM|{bhhj~Dv!CKLysG`s32{W+ zuL9z8aWO`*SW?9cQ+3lcDA<7)vQoivmnO9V5I~Q$OpeXA{97>lA83Z zk+F^Wia03%t%2eZVEuswyGr_X=-Gs*;Ankpil_~5b8K(GI<~NH#57igD!WuZx{Ols z3?T#U z*|1-0HZ)XRI`+bLvien*Q?e}#uZs5KFCX>SqyBo-UyY^DqyBo-U*EI-dPw#4`KzRW zs`LM5i||fjfB)1V|4aX%eEw&++j~6!`ykK8@xQ0~R6mpV{v5{;&+jK1I9r6pZ6F@c zt$po9yGQ`B+G$(kvMs{`weDJX&N|cgX|@PAc46O*gI7V}ifzks7C9w@c2Ek0)c97t z!1~L|Cd+gvdShbdQsV3hms<4~E1(rVWiQ*6&l&kW$+|h4PAM^M6T~1+fX``L?{u}g zsOl@S1~U}TJ9O67XFl6%t78PN5XxE}RsL}PH-Z^@mxL$~Ng1t;dnYFc5SJYxDQDau+lR0!W8)hGg`1QlomD^`OS6S>2o8bZ65JsKhv4q+ zF2Nx<1lhQ|y9IZ53Blb01b265BYQ6A{%`X*-96LYRkglVMbQ6X*r8UjT|_>AFLB}v z{c@OL?s6K(dn+-!PNu)8q7FHCpz58*MlO1oBhI4zb8acO;{6I`M`sGKOg?3=1? z1RT8fgKn$dgUD5))brk;py3xXvc2VhKq<>(Ctg^dufYJxKj+2csDs69w}S2J^Y*#@ z@J)XS%Y-7E`Q=g#hqM#Rg%nby@i0r9<{dL>OEEnB|6n9f`K#L}yVt*`ATRV2=o{b) zsN4gVeY=2Tk=&U3-l+^HB?Nz{9_OWLL2S<~lHQxyKQZnvx_Q;G;YLp5(;|JPv(8@CjN6w71FuT3g257ea>NI$?_R$gQy_K$CZZOKfYT=W>XjU(%#P4iR#wxg= zq)r4*AN=@}Dt4_XshS#UeTF{8h2+=X#`BHa@>+{*a4CqKMzDY*`?F#*ff+$HuMNwW z*=$vZS2yHedB&(om{>uuWT`x)9yf5en#y4c9c;1lr!Dfp=FlX4jIZSjC>ti+S0zvL{hHGzDn`Ze-&lNTRkrEkGPKt$VOn7 z`T!q7_;=O=Jt`|P(#c)W3vo@&OCw7?^npZy zhNn+ngRa~4an%=B6E?-msylzbv?JlF-@VcBz{!7UPxBstdlHxG9c}7Gyhtj zofl;Wtv`LHt;0whHFV4hDt3;h_q5M|?xP|*`bU7YH&l|9ldsm*)cCyWVZ&QZP<-i! zlQ6C?+z}E?j~PC)pBZ=9Y{VL?R4t(P{D!1YoY&%$FfI{McuQ(NuA|h2navf6y!c_8 z!M7z?=A15~)tV|%q;85(>X(bzQCcWxJkopDzfzyNl zS@KI+s|#$+GH`l{F$U=k+BSP#>K7ma18X@i-Vtyv;EUDp55KYufqjI}YYT>^@CU68 zrP>~}_}!B!#ulx)=y>I`mmaR*w58yNRYy-jW3kJbrTJ1^FxjpXceco%jx^0_hhnJ3 zQJ~LI0&@ADko%b~rC$ePDsGxwnWIH9mR3D&2-Cm=tvbx#3`HfH++>TmA@hF!0ftym zT4FN?%Sj#Xi|-pfRe5(nDeWh-yH{gk-3SCSoHn}I2Da)3ib{PN%T{$ltxR{oC+VyS^| zMBNcsNHyEv7!i)!-`A{gEuOSbO91)B5nPoBDCVB&(fPaGfIJ@anE;HRap3noCgCG* z?7Z!jt)S%CD-0978JwzhwFKR9Rp!Ws&xsa1haQ=gmiXbn8gtI|Svo5d3up#=y|n#V z0#ja1QDjsG?p8#oo zr2x~_g?LS=?eMqh%6NQAgd9y@dIYM`SWCJtcB%sTme#d&x~G!ccnh|v^d`6DV0=fg4%eik0}EnIGC5Nu+ej1Uv4H)M>8@+M_VgQ-9&FV zlX<)i*#i9|kA#YMmn%kAHlEJ-=_jcNuU{#Zg_)eQIo08snGl++xpU7F_9lB)-k7}7 z)HJ3rqh`K$1TNxoOR3$($eT;>wNVx#H@ETfw%Na7+{y%agvCMf5WNQM{J``MU{1d<5xxgOT z3HsqA7`k|^e>MA=rnQ4R+2-r$F_s>Z=mU(+UtFY!wV<{3J7g2E50BAn4h0E1e^sWP zF0?Gw;KK~sb8*9cH~qHa&=s%^wH#Y1HXiYXng+t2g0Ln#=sYfaxy!Uuj2UQF%5cuf7 z#r{u!<|sBr!pB-Ft+*@blz*2$`24C7MB7Bk9iH<=AGEW&lCoX{o89K!fJ@4CeSGj~ zKGfgl8*OSMJ*9Q1bQj#`y|sdN3ENo?6RLOb1940TSj8{6EU6j8zY4#wj*Z?Dhy*wA z7)+_uJ6^Pf7^(|`+$k$hp~X0qK1SMXMb;i#nbjqWgwl91LA{XYRl*4VbHDyD@a5m! z#}oT8C^!`SU8LmIwdVi_L^pgem236bff$i=%c~IiQ8M=rZfxrVSj!sBz#c6FZ3zLxL`|suP@)V`FSjj$hm!roM^v5c{U5bk zw#-U=`O9W(X-?SP6IX)sP*n%*=AH6r9PbSK`H1-+x7+bqUd57mX8bk{&jao0?yv+7 zQwxXZw(@HMMbrwzlThA!=6A*OpTobQZvRL6yhQ(FOt@bjGF<|4Y7fZ6;VkrGE>d4L zD)vUPe6wh}WStJ=J@$Qoo3s7dsBsTRBj9m=xznTg8vR+M(%EyrG38^o6<6?=XYieG zb3`kdqG2|%!TZDtfsgOU$MIN&vWa^ISeqNAozyw@^;foqy`0={w)dC!uV;^Em1t{~ zSQHuJjfuT~aQ$F`lrGO0yehecS9E;US+g(NpAUH%oa^T?3Ggl|JKLu`dL;gc697ex zB0pz7#n}ggjXGQ}=!I!ECd>!zlCEL^D?DCVJum9IR$?=vbLOELr8hEdQnIbfGS+~o zgBuT~hw03smOWO}ClL}qr@9XCm6&UXU+KD~O0HYol8|M1s1rc1!RjEr(e>=9%pJq| z)How{aL&#VCv$kA;$6nn+CCUp%2>}xljQj5y>QGujlmhC+~7HxvA_paXw;s{U?h7q zmuNf5iij3vxxSO@kW8M86EMAoJJqnIesMX28sgc2gXT^hE+gyjXoyf5P63e|-AU=- zsop_A|6t0BLjPCO3r=H21-xc#q5YL+k*ABjwS_)gc$i}ymB?fx1IA`cfZ$@m9Ki?v zz3#=$=8{>rx!7!)rn5eiX%X&HvW^#^#WW|O;)N56C1B)4F+?<`1(kRVY!-Q$_N(2l zLafk_@X!{}4hjFt@JafuDM&6}yyC+_~nhj=(FRcjPTFN+y~D&e06 z_pab=sO%~ly{vW&z?3o575;gZ0>>a2n_J2MX+W~F&85K9r44L(w)%-lcsgLh*sQyv zkb;5lQ7zr%r!GUWrinu0XMv6YU_G}PvdI+VKm^k?1gsLFGamLnzis~l9zT;F1NH_J zm?Lx29WGz`tsDLTtJa)uP?px}-uM$wmKF`#pR2|$Bh^_deWVx8Ru|rm7u-X*%RMJ` zD>^h&nSXw>%c8ijjoVTej{RKBXH|dWtOmkEv!oj{6PGV>e;F*9`A%=)XwfCeYVu}x z(YBY;lu`*e_=j0oNPb}UaX$##ee#HGbJtTaV&Y-AU15}`dqHblW^FJZWvVRSnshS_ zc@vM|3tW=<>Qz+pEWuVOKX(Y0#iH7lxADDQJiV-Kp)M=%J$A_BtylZL+w|CQq;X|In=Wc6J=ETKMN}FwQZy|;+bq#-e1@D1x2GA28e^^ zR*4t#ByvuoO4wt@#QZFBp>(Ilw|$VJjZflQ+JL#QDx4eSHCt zW$Mo3CQ~6xM_W{j=}NO0F8-+p_Z3Hh)9^3xAbv%5`QkLc{%0EN;HhfyxQ9!AI|N-` z_xnu`q}*a1!qWMDFGAeL49gST*x`B2Y=0ThOmyRsqhVc;tukm-IP8oJBGTmR zEBDqO$z##jmoX?<6_=5!)(Rs$X)_Xkw|T7Vim!K3aMTc`jfz`bO!n^BF;Lv=qeU)M zPsih!hI8_aN;sLNqSmZ9MgPZ6{Tst|_!(|50M)B%VpV_v=10mR_i@HsL}RtjYNnzC z_Q|wE&sm51a6S$dD^p8!NJ%>&SW;@BkA_~yjCfJtfiM1322Kp?2dECcqFn($2#r({y{(Qd-n zCB?UFh5PUa@l3tY5{gf=k##y)^;Qf{wl6ph8PR-fM0eD)6?frBDf2KCIBKDZnC((m z;`niN4turFG6`a78i=l~ds#wIa?>Gq`$KzOK5+Gg{jvt{I;xBNuqCE@D3{dl@Uc_d z$Yw{w1d1~eJd`5Jsj3sIeoix~C=57+Jx>cIC*n~L#ZUbq9$pY%V1+mWH`f&-S3zi8o(}D| z0@G^uZWc9b)du3>dpQRJE-2(WGXF3#$ZIWbjkQJpMDF_cwPEiltnrTTIJD7=khd)I zG2a)#)8*azgAh(a!qDy+RMRa%ilLMR8g5RcH?gOp3Y68vhZwR zYQ$C)4a~>?SS34>&r_MD=g(q2Vmi}<@Nq?DpU>s#n7uSy-_YeLT#yX?0U<1GD^3W< zPFz~{X@(uer*6{Ajzl^KF;bB10nzsJ;_UW*r&e{Q|4@TM{m-3dTZb*E->9=A{L5?5 zSb5fh?m`uK@cyz98jSxC7d11nqnHwYRJxWS|GpfbeyA2iTLc|HrRw}%tODFI+$+JG zh=}iEhcM3~Kq z6d`xcr!8OSDoP*3*8jBj)-QHgj^+I}v%rW#aWv>^Y3)|bDGj`Nt}#50vN;`(NTI=& z*kI722Uc}<#++L5S{sxHZ*^^^927w4Ft%?CuqlxYGs;()F5!lp1P95*x6Yw7e^)HqKk^zo?$BLWdct0{2t$n8S9x{4D z-(P~B(Za_g|NCu_6Vs-g`T6&sGXb<(%|}yenVc`J*^9Z0sA$1SdTzhHe&Vw5H=creh{+VKNfdhVJ<3q38C6rO*1-j!}dw zJfFl)&a(GZ1ha>1^^$Un?`1I2^x^ne6@wTEI5(iP_*Z^StP}6*fTSY~G*B*Q2`8+7 zwniv5b(HzU)N3DXl4H!wct3rr#>PjFR{6#ICk&IQWu=T_)-L`IIONknkJH}$ST4CG zPHW^j6=(kHzF$;lkeH@W?m{j1j6_^+`sJQ=8E|+mo@+(kGlfil{pH& zA~caLO`|pNdDX|KXi$wd42HExZn~fEkRuEjkU-5jh|V znvDHm$2Hx+t=d7Zv280Nr?d)0^8fH7YBwUHEr88_sU>vUn0YSjXzWbPBvZQ7U<7cTLdw$2OBG#eN~_{n z5dI&RK9J+^T>Y_ZSJ#iLj5qR!;Wgf;0(Jy_ayf)%56Y!x;cKB;TY=$})l}b@^gliB z14;&qX_lkE%Q4JUa1>Y5ut%u{fT7Nt`l2WVf@&#k|gy9tvC* z)vG$^gevr@xQI~wcyeq(C|>p&sA+UC+2M8z zgiaEEVea=gE(X6FkJR#3x*V{&iM10(GmYe~#~q#;)TD=45qo?l9b=~yV+~(j!Q-7S zwEI`^jxFgVaE6S+jjo2HlR%S&=XW}Zf^v#|wVGvKDK|V!)&VlDAxBA8Q)R}UWOL?ai zqMyq~OeB6N_w0@Oi&s&Y|1byfT<7Yp@!N_K%*<4k$CS3u2jS2p`X?jUYaz%ki@z#@ zjv_EG9HT017R=5zb6LnC(zA-DNaLvHE{iGgp|Z1c{wu(p005Y@k=#qrr>~%X5s7!z zKIz+g)x~qKcPc^#8V-&|g%44eJ)D`Ynv8A!;PV1r?|}|gI+8@X%DEu+p}#{u5v1Va zmhMkZiN5lUM1@lu(~1z&*y8{^axhzZmQ|{Ir-r_uAWW3sDY8o+Mbb?3L3rQ0ml}0s zSIZ)@QAKAH&y~f>-H6$2y;U|=({F2*xUrIBjobj^Sqx!vCnTR%0eG%_;pzL**(V&; z3YgtHIhL5Ur3R^$UUL)WfpL22>Ap|Ook0@y=(Uc@Y!#GHt6Las8=FzeNKDElZ#2J& zE%pMm9n`BjxcX-UcAJ(kwc(|hZF2Uy;6H%Hv3Yej4qVvIz%skcd*{^%OmsnsGn3f* zoArg9Mha5B2UMC(Y$_VP!@nFJ!v>GS20?FiR+XBPot@pj^{0lpW+$7EI9Oha3ZKsv zmojx($%D+Kv1WFSjx7{-sES>`G6Af`*8(v!F1TTkEp3z_R=E$m4OPJ%n3gc}KQmge z9Y`i7``#!C!>FZqaNoXZ#$qd)VPLGGrFiPun<#6aC}gP$a2loRd93j;TK?VmA=aZ58AK5o_wVtSQYw zNO}m3S#Uj@B0`<_`a~JJ*3wfrvWe;|NN@1>QchpT)4p!%Su>C3R47C07V`cn$i7PT zK6(N`zrf@xC=vEz3OF?Xeh&uJq4NMGKiz#m?X_bCu*7?R@_u|c^mvy5j<#@J1Lc}V z#0JD~uC9tU;)GF!FPD-Xau+vw0Pybrk9aS}2I|XqO z@}D{^E9NxT^dW85HS;;H=d>PqEcx1h=++^#@p1QH)r2(byL&uyXamQ#z7A(l`iH>k zxyCCf=uPTBjbqF!XmC)`;{c{=4Y&E4q1GSMzXEYK@Y0FmlabaFR+MO^LBzgu2=_I= z^KW`7y{*YGLZn`zk&?7@Y`9<4R=tRZ?`EfjzBl_QR?`DJVrb`StbjFm?l%aTTldQM zWwvL@k`fFOL);<+_ihUPV;luUKu`Fe}3A7kK8y+5POFHlE$#p2^XxdvLk z6U+vselj=&)Q~trN+A01i}O!}O9p5ixK{f^+)$_eFGH~+VqYB-Iv}+Vs5R%M4)+Kb zeK0NEkfsgv_f+K+vTO5t-A|H}>eZ2#Ma4N;?F@u#d$S7^4?EfW=ikG%Gil9=Z7DEs z4gw(x8DSGA`D)w(O?`!@fpO`-k0?6&e)<9BJZ78QKw_;VrlYyP1G-y9%#AS= zjnJFp1VT+(`SBRLBwIIpwhHuu+K?k~6doVTK-CTv1{@CS)HDs!p%JHLm{D+-bL zeCZXZdD7cBu1^u&+=ee9-Q0_GYmz*M234ks!0Rh4a!Z%P6Eu{VP7LlKv})Kbk#x}g zErv|wKu+Lu!MEu{@Vyq>&$uR{>wjX{CCW*6IQj!C(}ks_DRO*!`$s!&1laxkr$uRS zp6%_L!dIWR7cz5US_cYami7BNx=!ub@$-DR;IS8FQ~ucsWuX4S?cIzlTB2LuE0+M} z6WFKscPbbOy4YP}{1&#$QsRsYx^Wvj!ppBna&G#$FumwwUbN|_kE5o(&j|i=jHJy$ z$f;kc{}m(qD-D&pi_-*zL~YI10UMjphn+ktc!2KRhBF_7BV@CY^Ho(RPxbQa=9O+a zj&HtK@rk=jiAuui4lfDyyfc*KVASg>GKucTjcPIF;%1?7mZ4mGmuB2{>zW5py%0CN ztV&Aj!x$IDuZbS5fp}bO@~;Ppa=CtvR`&*#YiZ1C0ob}Gyq}7ody_?(kTS9Xi)PsC zmzs)6EB-EW$I5Dk`G)g7V?U* zx-n|MU@{Ve#m$>v5O@3bp-mQ1`e#)J)=yiQK6Gu`>wUt$-fpq*Smv+V^n2_8EBdRT zbT3SGzVuWsyM24qKP9ouuexZ7^{$>&wEd^|*j`O4kA*dIA%!sux7S_qc?Es5G~})o zAUp$+#&~P30#TnHdlhIUA+7xPmXKd>?`nSj7o*K<*BIeMc39~FTi8+Z6U|0_(N_@c zmAd{Z+ZL#YCK&y0b#IAMR?;u$6_P`7d+RfAr z_jFxbn0#lh&Xl54DAh`#a&Ju-sBoY?)u%pmS!jj@QKPBal$o;Hr(CCt^P|ph>vZY! zUrM}j&Wr+-ecs71xzI3%zi_9lI+6~<{i6)8IK*WlVWd?&ky{90QoLkUhzswWi6jb5 z5PoEc@xVHG(kx(o6F`QGojZt z9`se9-gIMR)XcOJmJlXhDE;9ULc1}l*vQj|@F&$D19{Jl!>{jK0^bM#+ADz`p^Fy# zt`@~P*EF!tpvv6jY@`5<(_AIGBA@)@LdF!ckcxueDX$^XsiSkq!K8fxh70i-{^=PaqfgHq-yuOB2*CDx0cGdJ7M= z2LrW3SXEM)PuYcEKloMERx)r#;hfb1YBA&q&SJ>dG4mxD%LT4S{mBhY9b#_SR(4fE z&iXQFPlH9AaUa=+{Z%!@Te&5s47J@x#2dF% z)dns_ax2hiv{ABLN3V$PsRysX6xLf0XK#Lr)AcrXxq$tRXKV#?5T2(HmW$S2Y67Q| z+lHv+@pIdo->W_*WMmw8{KotQ3Y{Y&&Q~e}vLK-8>!Axu02Dqv1nd`iU_smDa7YI* zUXS{TeP2)~&}!iKa|i;q}8iHnL*b_X`daFn@sxUz-bJ$}UW!XUL6$UC*32Bri3 z?REumw;rxRwW`2yjy&0$5XQ~fHsCzx9S%*GHtuIl-fPEI0G*1=5xB3800{L6m_U zf=;AUm*4Y9gBIFhKYcc_caQ`$OlWG6Fmd{Epe4wOOpC#Q%T?N0UJyVC#rdOl3xPy4 z(%l`K#b#oR!~vVCD}+Vx$sckdDuxN6W4HiY?*Pd~UAgD)m8genpxz5;<c-`KM!b`)P1=qq9IzcQ3w#FBxwd+ zk7OwCr{1q_3J@We;aw@n`(8y0Aq%6Mgu?mK>R=Nd zB7aGg{3`EM0vafn)3?WsD!6V?G&GMcF5)pnE0Qt!t}{!e>Zs0_QnP{A95$wq8>@bi zN;d$~-h6H>%bBYK98Cy!J>4FWwtS!SzCOsmIX-9uZzj3uFMw1%DU^OZbBYWjeFQ~r z7mSuSmtRk&d6I3LjWpn;fVAE?YzuvILaGFCxCjXb;#ALsIXV#s_OZPk3iSiG`@?o< z-J^G|zn912ENhJnx_&w#8{+xGelDaC+CQ%Ch52?YZU|3t@ya6r^FgV_yp1|&0A~x; zoP+wBVI=_P%MF1VGBh>R1}3rQFgt8|sb&e)8Ujude*P0eDb+@PdMr8wBQ_1Lie91N z-P9o-ZrLip8kIX8ZK{56lx{M1Y0q7H^g7kW0eSZaT|Fv6YQaNsuKTU`*W%&BzFb`h ztNG#e^s@%1M?B2?qzmO{+zXK`c}=_{abdThwqkQwdURu)^EPrGq0U$E!tH5ZZ@cIH z*7yIYwdWH>z)#${Sdrm|LU!n{ATa>Cx z+!ITBnam%08;pCYOYjfR7){tkLov$5eT02%O?OYHq)<25&<4^-I*3dpjxyo|!7-6O zBlhd8)nT=It*8FeN48#A9Hv$0rhfKPk&Z0IOTHiE_GK&x=qU3?ciPh;VoHr*y=DqL zqB`UMa#JGD;}#MhfA&P)*yS-FLW|9)R)16&U596HY8N@?U8Z7_FurQ74LJ4Oh3=J> zuTW@KM!z4IRj=(u;8>>^4^9>^=A9`@_yKManv`+0d3rtW z@L?IKvCRcKFP>BY@Axp6%tktjR&q)rIL{CYHtj!;R#118_=#-%9J`2%uWK+}o-WYr zElgL~i1B*m=Ntob<Ug3LPw@*OOF?FyuJRvtMU13@_kA29-+t2%J>!4HoaTwQssWz4@N7GYbugzc z`zbLmM!IDlvu{0C^}z6aBru&NnEM`^&X)oEGRBXkFXizwzCVoyc^jk-I}@)6Ih)ep zLN|XS4MEG=XKn)QXr*3&V-l4p5sn&uxAZ92u?KRUCE%Uw1q2;FCmruXK;cqn0F}wO zUJ6jH*jd${Jl0JTnDW%VpIiHz2&ew{`+B2pkfY2|1w!j4(TUTy1<-&0DZ9Khn4{Vd zaMPt!LR<3DTLU6`J6Di}*WyuWuIF1?rug)kM>dSEgwBF5X%RL8eYpAC48L+mia-}T zPF|);`Q^VQ-vWF^sdgOIyYW;Hn-nDpw0OztnJbN@GV8FF>H9DKVa*?lzZ0~fUlDJ` zT-I~T2Z^z=Y&M<9L7ZB1amHmI%mol?zMdW-)oil4U2NH9;f%NKO{55=X(n>b5Ei4! zI=S@)h^(hB9eJWo1Nym=V35#u-pj6#Z!0!%j}L&^Ff7?Nf4PQu>Vw2#@FR%$Z^tT} z=xVO_7$tg=Dnx%F{P-o?Y-01}mU=|>AujlpOXv+1OLj`8!PagN&PgGu)I6y9y{pE4 zKCue0A9^pyr0dv1uupl@k0uM>%UL!zn<9M7HLRymCRkb$d_41s5~yQ(KZy|UYFYq1 z`&ZDxTknP4nc%^HYiR}aQqQ^vO;Lt(FP*q=dEddWsrOlWlfb&gklvUdDIJhmtpM`e zld&LlX?Znl3A%4lW};wJOZfoDaomS?Q3?8A1hhX{i?5Tu?722UjE}E z!fAyS90FleqM-`SQC$?vtThnzylBuO2zodHK2iexx9_MZ=~4MQFes3vXSAqs*>&nw za98ri0_CxGq9S5>%d(X3vATt&&vD@>5&)m#s}&T$;AYerMcH=L6mfag^bcq_aaG#h zqyfe!fJdKA@2dZ}yB6T|Q0IsLNoT5na0*jvxG(b=!SLtjA8gsM9Rn2hYwuj7YK&?h+>D>xV~uw5 zUz(+$jpP1khb&6!Fx!gPwS5}@&@Fq%bZA3y8H^gNsgXQ@;&NDXyI(dR z8LxqhUGQ{}0O!l*8ra~m%X)9ybD`^N78t6u)O8Gd+?G7=ASD2QYTL-ujUHN22|TUV zi|X*F@AVNb7W?G2;ED_ueZ2qhS8w6WP{bNk zXXA=-W*F|tsoekq%vomeq%y~kb%|0>9|(^UH)L}fVeJz53ho88f!%=IpAg3t{}ion zZGNnJSLm;hT)RI%!#!G2INLZ|Ouj8DK9~^nQ3`>4PI6;kd($wC$$;8Lz{9d}_;wS~ zi|JM9@HOpBst@E{=QEERpWl?m_?znd)*Z3TkgFYb;)FL_7N zbO0w7Kv-1)KqeHwsMB7!LWfmi}YO%XtOHsHNm|2Xo_%+G>B7P-YYM$g^V_~a%o zWkv)xS-C|FkFC6 z$liZHN@*9s=-&HW-e1!i{Jfuk!97%q+OjX{NVK4Zu)!|fI)!scCnQ&0v;a{$CQ$_G zWdrID@0T;OeIQ7n_>J{Y=lrdSx3{+GQf&pyRO(Z3D>zKrU$^OgM@1UvOA~09?wrXkUWpGyM1I2+dZoBWzF*b~>j2mZ$zIkD>w~3z}v+1>Trsw0z;n$;t z0%3hTrhV@-Lb4PMxa1t0y}mCkA+U6yBMmi}->KnVG5e}p@6Z`scXiQI^%C%A>gLm_ z;BcI#^HXg>bs?MM{mgq#&P(%jPu=iItvK4fe*(?dF-_tiK&7U7s}rwBI3s z`Ku>z+b{6?z4Y>PEOexGha6JuVE44{XdDu&YWjuvaU52g@y_Q+|2Ey2C5oL#6bXJm zZVl{SD#~*vNvZfkw1L+aMyE|T+d4Lx!koYtMB}=Lw`o3SA!6fc2pK=* z-x|=kZ1(yXB;W%W75EQ)Ufm)5Xxu5c{>=O-WEAg-#jY`7Fqh8W!YP9)EL2cAd5Ene zoL)AKjqY-Lg)syczd)s#WYuGfGCU&_Pi-riyS2)hI35!%!*IY;3m;u(;%^VmTf-oI z?W3kqB~s|;h(;`1X2PZNJkF*Ycipd}M93kI+ERO~<68FNX8j~P(eq!}WV&TcRUXX$ zh5pH+a*)zZOhgOeIr-vQVO?6F7PF#)N10juq2ODYngYK{DdBm+MHX|cIzhE(gcecy znbH1-t{9bf?2wIkalycNL^+;fg|O?Xi~3Bo<1#4>S%9@zEqwXAY+F4{(0jCo5Gjj0 z;9TmvUKOz-wBRVgnU6`0wQP_19zx&SSpDs-o}pgZ#~med5^ehI6uOenB-o8I6fGK= zx*86<64i9)M!AArL~Vwolrs7jc`j5Ew~d*8C-5fc&Qqu2ZME{ZIC|eCOCp)Y*jSHG z;e7GK**p_>T_^YCM=vJPaTaj;ImRysH0nA0S-r#_CF$TG1GEJYRLcEz`|xlD@b%>= zml(?X4m6!HA^!$C5j+5Wd%uvhWfk*Z>M}Ixn9(huETFk`Hcu+iJ%HAH?$uuwW8hI% zgT7n}TWvP@wAvs>bMB{i&e-<$4F1T^wx`#jr- z>HJ{{{eX4?c@b$Ckc6hT{(6HG!qdrbh+aZHh9>_770*M80lHa2ZU?s=uL&kT;z5P_ z>7$S)cv|N)=m}W6o=67N4pksR6aCYm_O`2SzH?f>@nLy@eyvk#r@PlbjIRgm z4&%&)%sYPFuXl$8MnqcS2bRBF(dhl@VMHRyCAQyBZCm1{?9cCNtW@7${o7YiG*8UC zI#h!2Y%&eIM2}nFV*BRDDuM*6F2WlEODNrZ!vGcUl-01Z7b`^Ei*x_~H?r{{0pC4P57&hOG#%N<#VpiK9GQl{ z6s~a`a(p4xALxlQ=0WdoubCzBg$s)MbTmUwSA-F`hTefWtusOLPcaE!=C*K!(HR}3 zakf40X+8|vo^!1E{mJD%JUq2av*A}KZat(!w@pp?NgGTB`$y_{+}Xp%yjjqXZ(A}x zfEe~pPE9E<5huEV8N+RJ=n7#6iKUQ&JU@7=NfI-D>0%3{$*5uGTTSgrZg(oyr1_nqu_OHRgkT_IA=5h=8r0*;Zy9Tz;#o3JN> z$QfF7%KMlN(YQ5dS1ppJQTK{%K{uD=-^r$amsUv)=^%@ozVG=MRfD5qEn4dtDvgjO zU8zbH9I}NL{xW;0zaeos2e#uQAw5{&xtH2*cw_AhbA|A7!SP_r44BD|To0{F5-2t# zT+x=1jdD({LV|I`N4l5fzDjZAz*^|@*SKNA*}(T%)8{rm7Ymy+8y!^m6+XkP;wF0 z%7(PQrk&h+5~LxcB(EKnDJ>)nC>^pA(`px^3w8=;sU9V>qTU&8P%ATEVQFqNF9DbPbbkb`4D1#CKx-3{Bl zE&M5S=B2E3`tNVpAhIWYlppU|-IPfUi$FY3zAv%Bt%uh)GVu2XG>}{b05*hpO+1zU>nP_^6lnEXxQu!V8DDx8U}enny>)? zAGj9AIQ+o}^u~K&aXAAe(f+bOU6P>U$qE)*M9J&v4E{i zbaU8h_Gp@LDt`CfjPsPi>D6%5Z0ZhOoM2jr7Q)tee?JYq%Eh3e%$GA-hMRJxU0Y`M z$cOysl`F4V=`0Kv0qcdlQc1G#t|ymd)gMT?fvgL2n6X({kRMZ;)e}ZcvJh)CW$f|d z=KxSU0c8I>6aokKyVsayKQfa2lZ+dnLB8El-RFCyP)`dR3$Kk5a zBoU&?=o|vg{ofg#e+%yo%JiI(I9`_}aR|DDSs5ktZ)CAN=3pL{K|QuZpsDYWU$5`i zK2sp2SlPeL4nN7yqo%4V2{R=9LPJ=cmwSYKh+|7F}wn*Bp}tR)I45T zzat-vM1QTo%0pmOp)PHck#hUy+-n!Do_gNjH>dHj^a$^YLx}xg@9MGe1|Qf~&UEft zMttw)RqF{TTofDCRzx63uGOU`X!STw4ppYh)3C_<{}ii5!DA)!)w*gq*fO<}D;^Au zlYedWIr}dk?Trof0tPihF7FZmp^;meX^=Sc5KT&+@2uwh;ik>I_pbfXz0a)fU#|y6 zvxP1%vi%(HrlYfvuXVrQdoql8&n=>rxt)Kce==p@6t4~mumhJ3f>Psh0Fq^3P9CsI|eDX6$l=3vowONM!o}}F9TU?NuQu;H*6>rVU8*H_SmhQ6^@T| ziM~=33MEvr)4Vz~zR{*>E4&)1gP->fff~yV;8>A1?z$J__U{$QsqddJ5|j>M_vrgK z?6#F0*p=xm&e)||WyILHS1Y&H&=%Lk*r{&+m737A{sUr_`PwvIr_H?Sau_w29fQRUx9efElpQ0l~DIuJDTDVkiEDw z@^v*Nf_|#8e%{lo%=gzID1h1!QK!Rvp_Vk*yDI(oDUau*ZS6%Qpsuorj$8manqMFh zh+Cvv+0u|#bp?1Hu0WPMSrpY(}WH8Wq$}dc+|-h5>L0 zm)pn|zk+D}wU9?!BHBa+^?uR8RE9H&BMZc8Ns&un6+IyYz|A#3@JIIt(UMCt=BlCR z($MSfV9?<>6aak00c1N?h|&{!?1{pGs+imFoq!~#Yy5f&sU#4Uez%v=-aNb_2lGs# zOESvGfkE(K#9xD;IWvgSeg99l3CJ(Vgu~7*%nS^|W$Op+9V81xqnL)(y{*bwm>!`g z8*%QlO{&4lpxSpTl6H$({>$?Bt)1oDGvnleeAioqdFJ}xa;lY3G(4|TyuI}G^=*pN z%rC*#bA;X|@H-C&^#bSkkhiVTB-*XgxhT*#1GP-^(&1r7`K49(kBjeY21U*1@55aO zio#qUrsau~(_H_6 z1r$`l;MOPDm-G_;p{dj-So~m~J;)e!teC$b6s(82lzeFB^XLogX>Up#yE* z)o$JO+1=QRA|xOx2ja*tIN{4+R_fRLpIW+ zX)?JSNo(J^J8#{i6ciHpg{&L1sLvd{2Xna3aI^g8^}4?_5gD{Q(Y_5e{PNr3I;Q2i zFG_P4RgnyXjBsbh<(lKcUHE?J_8@$wcGnl{|lebpEU1 z;W{kJp;P~t{qb;S>zIBeo(OIu;Vy^mR|LC_NykcL;zX6vd~B4*N}Z=Yp&lrtS|F~Y zl}$t8JD?GKF;J0r@r zM8R&)c=l~{w|UZZTzbsg5Q7{pdlceM%ZGRmT=`?xjqJETJSx)0BiQnuiXo(!BL(vW zMIr6?Cs&(9iu!-#MLmC#`-0kIk54?##`6}sZN4`(Ca_8$7vy+$>u4w>^fEkHi6`u- z`1{dr$;B6bkh`BK{ky-Nb*LEJNa7m;I}Xw?9#MEIpNAl3jhYZ<;6-KvChJd(kngt0 z(h6pM6KAIYG)nOQ1t>Jv%i|TeO-a0pcJe?dWOj{IYuKWZ>=E-5r6o#H9H5L>eieh4 zq7B3`gL9T7nHVdlo7{68i`)|(vyD|RX31N+##j~X(i?gweb}Wt?;+5pIyDr6Jvb@Bu!C3*`g5a0jx&dMwskP=y$+_vI+&K%foG1# zS(dS_ef>WG=0~L5wIe#~cbt6RKKWDI z{V7p3Peh-+PL3@0y|vGiS}R7p=-p?()aQw2$aq7ymy5?enRjC7?E8j3TZG@FxA2=7 z!f&DpKX2%Ec65k7&pPS9?E8j3TZGu8w-B2cjBQd9VopCHb~5dx^s?_8`fOodlitj0 zVlb~siFx(2bKH|@Ck>Z<-`3&bo=iIKn@Q8YvGB)9Z~i#eU0wo`KAxRVbVQ%W9oNu! zept(hV=i4Wi~x=a#mk+vU&O$66FesqyWknuy5+=+-UC|}JY&r>=V{t_w}JILG9=&5 zkj6H_Gwv;T#)jY-Yl6oe`flew%NG=`gy22#I&M_YVu}i4ZT;^ngvN#t8f!vG@4s5( z!hihk)!U0_7iT}ey|}vg=H>IBpFMwjasK@36bx<%4hPaB6%+8{@(sWlfLVrD%t+%S z;&$9>uANvaom&}8kw~}77;P-Eh2nFM2s~NQRGuI^PfiO$vCTCV=$%>|#Yaw#?5*>0|J_C2?t&0VFWZ z5Wg;ntugTpACPIwAT~81Q`hcp^K3iG>%EiQ%78fa1ETGu>+AnM0$111E?)5=xVZcl zZZKOIrFGD8PdWDEg!=PG@uFw99X+y0Kr*{sONvt)wIg2iCZ(*QI$Ge4+t>LwJ?ZAS znV#4kH;zr2b$Tnaj-kvtC1tj6pJ%gfeV)x4`fO2Vo!-ihu6ISr=cj(r|C_1Pj-o!(N_F@%UylBzx3h0|{FJM8<0K3gP6@7Rs`$eS5`mJ)=C zkD)iO6P!vwG8F+HffU8$hK&P?{m*x?sS}IXV&^8XVUQmbYedNWu3Q; zXHSJ-KJv!Kcuw^3?57Y+Ix0aEyAs3*wDq~CLNFhBzR~Bg*5{sHkIAk$U-ctyPe zz+Uw3vuE_#*ZX`@x4R}C!*?e3@Eu0HZ9IBv3iFZY7~|pU2sTKe4be6Fs~C*?l7^V&Ykg{%}K9*`O0B@ff2;NRgQ z0NXVBYsPoIN>;=1zqxW`?M_`9l6Y~aT!Wd>r4zkN*29R(fiR!Gj-r0zG_Yycrqa2+ zRXW#D>0Diwxpuos$u{8=7@`ElA&P??pee+$wL><2&F!tP zxrV;xPHQ`4pFB2e1;|=OU<{glZF!I>PnP7yvXR}tee|De|qPaZBy*k=WJsjJzn>Yo!s#N-2BdnT`#6#0z6cuOVdXPFL;QIXhwV<}63t&7J zd2J}pwkfKI4^srnH8E}uz5+pnV7yI4%_Yn?t|%fDY*S2kAYle71Pe@6ZieVDPer0B zUae570`OHnp=}Df!w$Z$9@B_jt2bLn>7LJNSRlnOwLt_ zfAdusq9o&mN!YSmtpky#7L(hNb|*6`KOtFX=rW z6~mBlbtRI!*y_o#sdl|JJ43OXn`D$Hr#t)k^epinxrb%YZ3<{F{gX8`R8L*=bXsVh z{W+SYgEoz`x58-%^g`WqhrZSOb01vR(m|VY)>}6-RI`cJLC-w*fYB}7WirANGEEw8 zkW6NiDLiBe0+iCBs`^c0H7H^zx*a-??KvKE%SqV0??KpnWVpS?`cRmrg$S9J+JrIy zBOJd+R`bv1wCeA(D%0!h^jbX@<+bUbbPKfePppA2Cs&w@2z2T8^_1;^ZGv@Smi+1qs z$&+)-QPsTfN!5uty-sZh)j8G0CW#P_dEw5O3~!PMFLA(2=*hgL>4{@8lV&z9;3$ zt0n;E)Cb#)l1*`r7{LXKxR_Ao&qs3lIx?o2l`+|}etReV8acnS=IK+R=zQ7g@#w|% zQfnB8k(^K|Qur8j%o_9US!1>g;NA(q({gms%(4J-_N3e6)dT2q?3%o*L%+^Y)m|3E z(s5_o11+W&eQMfQpPH8SscBiCGM5I9rPh?BWWj8@2=4d@P`p88D-Psu5qytQknJ*x zHkSC^sYMx@_Em%Ds_sKP_=#*IsxbLsXsJ zisPFbez$87LA=Rp|BJFNH^E;e%juYp@7we7ZRz;Ev+*ZoBYaxo#M(G$>{i(;>Ub-H zJDb@uv6$48z9#jgY*J53CUs33J@@*8Z3502)V%Jc>vuFIeQrwH)_F%0-4`Z$PARR3 zxcafIKR=rEjnSQyh45rF)yJ|nMp_)ppCyUtcgIu!-<}FEv53-1Ur}llnV6JBsXZ*! zm{_OdDsdWCiPx>n9{b+(-HONve)hmGF#zIQk&P;I`f$9m4RO7c?_JcwsA(}NNqOxw zHP_-Z!r7-RUxYRbl!An0bd{p)mk6YUP>{eZyCrF8>qEUD?_H$As8KN~3G%i_Zr-e$ zrsB=4nu@I?Mem9fMnQ^6Ns!mn61WnU@h(p+3Q-b~9W$MeN;yk|Vl!ca}WbUUzqii(&o2@Jo15sU+rf-^QQvisdsK+oi2Am0C%)I(edZvgLu3*D*BHvxjE- zwiqYBcZ`#7#5nnSjFa9;6{1#{GawELd)N zbLNxhcid8b)0V2&vHjk$S-ugQ zsfqc&6c_#sp9c|6G6WKsQs5l{7{Y{~P4Kdg%ywsg1nOcHJ{In*+kSIr4KYk^$Abb_ z92C@f=*4V>h|2P`BnBCU6fL(=lp$)Jje3RO?|DrKZ|NGd;pwwso<*ONWC!pE?jVth z{HSscN(l(oI0{8ceTyI2x5ZBRJ!7YMOLOD7^_`Kr853xHCWim>?UmY8LcUcx#k5s1 zYqFdZUGrm<46N`Cip5cq+wmC1wI8GSwkRsUXA~7{IX8yK(T8Vd%=Q1h%_vAxa)Uzz zZehx|7w>$q-jEP1Ar{AJa7#&o(hbfsF8%pPOuAV#?!;=*_?7@Jzi$ASKQa{9xjqb4 ze>Jo0ZeYrIid+`LqM<2*n+V4UgbT1uqYS{6HKg0OL`3<0BchC8d|!)*lD()W!=^>{ zRw4}@a#lN-`Ib{I15KK3(@3UxsB}-aW8$l8Pki+)o>0H9C)6mX<&SiQ(Vo6zFN)`O z^!U4WkH4+xR_~fyM#(LIq^oT9yd6VscJ!aS_E0Qag{|HNwv75({zzBVcs71L88)@3 zw^n2*MSeRnZ2CZdb)Za!*NzOUB=1XxDaYH9VH21=<)vp%iqnP+Tb-ibWr~a{MP7MQ z##S=wC#84cAfs-OSDq9*8TFIWzg&+w8crKB>aQ<3>3e<2$;d1kR2~gmEV{LfPv6mS zN;f*56!(ZU)8W|cI;Xc?=NNXKquF)NTm<-9NU7g1PH&^eF^n2VGivsbQa?RTZjCwt&cWox4G?P>4L5vKWHDRld)U!NNzD~zwTKsmj z*!W0)Hc}?TYez=Cr0HE+$fzvj6q2Ty3>z!EOA3~2t`cWIEi*=P-D(vt`cN}7Z+{y>8%p1bEcG>8!{Q&3JOB$k8UZF;CspV)y6sPWIV+ZZXehHnBVFEp}&y*qxbT z*M3<@$wZrXJAahPM~I?mr!FGf#@h^qdGEOYKHqUD=9g8KzF3l!jfbs= zb;{DLud*~ND=0HVPpWiJ_K8H6*mC{GHPH?E-EkJAIH~uK&n)`RtgpT^E9*NmL*J>H zG;vUIlf-7^j*Z?r#c0-7F`AVXqnV)?S;~|0Ru(dPdB9l1ahZ%s)38b21LK%bo-Xtf zXH=|ko_-?!6x*0_qa-B($}(9;TVB)_>NyDWZnu%oZI_YHEIQ+?ug*9t>x?r)XKd*l zoOcTkn2YFua#dy=HzrGqlXx+h-QqFkA{>KbyVxWtx#1B`{9g!!v6xu4Mf9ukvt3N# z2P|i=Q?%dQ7VI~(sM@o>sy1tAC=MmPp&H=Axg0M7FC5tG?LxcGf(`VG@6KO?4Ng-z zwUbWCGxN!bS5=V#!IwKhJWbs@&^TFuG z2_}ARZH#mqpJlH|{F)Fx7X=S8!(FLLtmKi)#>8|pFl-lL%`8^mtgqEKH7>)M85Unr ztyo{CuTe(RZ9qlQ3%=O--8YO^Y5}svP!&r##7gRQ%jcTg(z&L#8+E3=Z`7Ic`z5r^ zKh>_(F@_}2OVCxP%xc*70ryJ?6G5$CAqWp7#y05KWy@*Zs0R z<5+8U%05z*(IRvSi-_NOx5^`PTj3E&ptaZiCwy*p+A`tg3IW?hW|G5*yBA9FT=JR} zUIPXObPJn^Bm4;oKRQ*||T+^8{STGzlgQ4-UTF z#v%?d!iyB9JFdxGr(1L`Bk1;haD{oA4TuPL2r(t7cq?voXX01>y(C-{fgr;h9KjSM zkW!S!M}V$zmgBgE8CYy_#6@$8cv8m(;+UcsGIRmSC|DqRi%=}|E&-l;E1x-U(id3#Ayd%nlCzv0b1vMigbI;N9Q9cKOB6L+2g; z^qD3-4h}wo*C-(wrX<~gkAMg3eFSe&%B%tK@!;c7dp?%_$Nt43UgYU;ydQj+4i2u_ zVBicu@EwXa;H4ZEksW&QkTR76QB^ z+Tsvpg(xWa|A?fk;|+|rFgpH!c#A96;xC@_g10$#+~HXm;&?SI*23{2SmHFJqk|#1 zLWpC2|7RehFb-iF3akRt2wcR1?dLarF$j3W z?J@oGFBKXs7A(Lq=Lq8LK`}+nGWninJ>Wk4#jcP`tN|y6l033FgE1ZrP z1vN4s!9Nh=?$^77ad$O(>|er*uJigTlOL93z`;jw{XgI%$Y{zq{zvd`@aFn_@D6+g zSBQfAYEy8HH|RekMhvoMx)yhzf{)Tw%Ygj)8;8JeN!v|J8Ta#^+U$vHTU(tKC8wtr&)RG8b3>M<>WTdEOMyEz6Pau#H2MiUq_8Dv*u>5(<8un)r2h zX^9G@dgOFKF2Dc;4A@XY6GU;BN)Vtd14|qswvuTJ0>34xaAV?lNse-{OTkZUb%rF6 z!j{Q45@aLIROeEQY||lU+){K&t58xtlmmABL?igHepE*M>cEd6!WmycKMjUMxTWjC z(I6%<8vIMGNNpe)Hoix2i~vkme0ydiwrDdPqT(*j;c%OwbQnSkhapb+U=``M6huVS zGZR};fG-WQ0wlbSnWYQD`51zaU_l6*%y&x|Wr$J!T>2%qaa^6kVrk=8UM(0}QQXw+ zGhQ5E2T**2QxbD7bpun(aAxub!U7%Nb5`&##RTN@zz3eG9R)yn`7sIws9PLGY@G>n zof7GG%%@5E_q1**WlOPCG5Atf*IEkiF25crQa3FsmRsL}6{fcR{X-%+iI4+K#6T%#B)2wiIv2gR+mM|_-9Nf0AM6h})^6d-0xAPeg%lXfM}bgQI2 z|9~^TUF4~+oOt$&IRe+pQUd5h!jJhdx3CsSY{Z!6JPUz$IQ%)y;JXIqI>PZPMOoHj zFTxnek2PPp$yaS?Wcqpy8m7qWSn^VV-I3gq^gWJO&v05ES76ELPge=SQRiyL}R7l$o;$_+n6SBt#&CloHR}#q7%MnU+KMx z5zW?wR5oP~p_hXyBpyx4mMv`lv%JVRFYSWqns47r61J3vHFS64={be_7`g_%A3M)6 znY>(wd{3M_$JLRK=j~c@@gyZ13UPD~OC<-TEtOn9ipWZ+*4Y~KTMf8&ACdRC`!Z38 zD%wk~uH>ZDD=W3Yx~w@3e)F2sp!ZvIIVN+>>5%Vf&E>c{uDQHj$2B+Ni^8Ovt+fQw zbtV?biYIt7G=kY#0KLaGB9Vc5^ZF$N^pby3G`&gU)=SbKMy<{ z-X!s%(e05S@LL?A@`@bD9WXd$()4Jc4z&lTgX5bdK2~i9#VckE4^9UR7B?BVBvS3E zc$tIYEB;d2+)x(B#s5JfenkzNSXun!TxcZ9gl9|O?d7YHy*s1)7``mHOT;rGeq7^V z%@>(kTdburaTikVmJL`NF6j@@@bS^mbOo_kO5ejUWGb*&01LEaYl5cyOG*TGv9lmu zkNDy&+|kA!WV=lkJ*kje&vd#o1|EXfjVG|Z(UKiVO7Dq@eR^7%c2~nb3X2ED45B19 zFjjUwun{wrV{vd`a>#F4rZOx39a zI0Gmq+tu16#EcecWR6U3Ddd`qNcFe^tBi_Pwu}lptf<%w0sDLe-oglnYNd0VN;NtH zYDP$^#awfw%O#F6-PP=ZXK0CIW}T@|0upEZLNp4}EqCVp^iztK|0)g+-sgL8gbC-+ z#{r20l+f%r3)U#yMmSy#(T#Ac9W!%w6%P{<4r3Cc<0lH&5XRvU#uN|LFOo?|369YP zUy7F1B|d3fTm_I(vW=ok65+tGjW3q32)z`hUS-VB1PZYu7zB_=5C-&AKlRd}uhv1z zMo2$h;mw*+ncyj0mEqp-T1npjm93#SnVx!c6#C;62RaCi{pAcUrzh?bg_Cf+3_N!- zai?&xbc3;rV2Gx3|777!!;@ehc)@IP;x|*nu``P5bj%-aP?|C^#*H`jg|ai10axq_ z4rEJ77QjgKB%j#7sU`e(#_GZlK=2(&@qbv`h?!8}Og5Bo3Ny8Fk?3w9`$92*^;;~u zd0W3?Of(%406Fn3)vUQXCQ$0seQQtL=rB8^K)e)Kdu+_RvHNJ7gJI9FO|QF&kU zxNwD*$y9tZ zw71ND3^nhjxTC6GK4j>P`uYR%s>%5pS2-YUIkGl_oaBT zr{^>!QH0VxL&?N6&_9vdZc!xlSk-*W5Iqhd+K@Oyv;j-4md4Fkt?=mGG1@(RGS*m* ziu&GcZyjDnYH#iG!mQf( z24|SW-{FjL+Lw64UGx%=&t2mJ{uNIU5?_P0_#8yydjlrn@hNY3Fy$zLDaAsTX#6$C zks1iCli;=96lhJGFl5_wg>2A^(KLW>;0GXEHUZzp@CM?DucbaHO6|*tm=;OVYG;F6 zUbvkT?65q~KYOJ3C^!Hx89C!ZhF4>H@N-QaT)R*IJ26;cd8*lW>J<0sRm^ zLlL5=+PnZg0?+soWgq}v#oSh1Ir z1S3a8)RvjUPyZ^(W3AvY|E^9bzmaswX@;@RRv2<5uZO~_>>|IKn`~o#0`%tUn>@Bx zlkfbD-!9t4YfYl-rIC5(;!JeI7-D9(3Y{ktLoH`=aQc&YIXE5gYORB#0bhKB(}6qq z?O#WO48b&5qb#2nbzBIZy}DB8zu8f)ysGdxQTtV(0UNjjDauH6gFu``guLG->O6wP zBIQMMpJa$`6S;cBIIGckSWf+RzrEtgX7h) zbU+MYB9fxmR1f8c$4`X6pV`55jnvPFvX6D{sP7?;>**eW>xz1I#Z%i9uQ&x~hv52u zPQjb&bMVa}xIDYM`tjK*`0KB~g3)Vv^#G5@{Oz~Dg7e}7{-F5g+mvkNUjU3oYA*Qi z74fcKUMEpaKh#?uFeKa8fAfK&G=|YdOi{Xo0jk=UZ!#n!qOiJ)VOrn_L6!8oTh6l%m+909fOfuinQY45a~^y5y$i!|DA5lo;jSq}gCVD2c#G+p|8och-N%P{PZiUu8Rs91gcAMB zqTt1jY(?enoZC_Y-dWh>yBuZ39V+MQEQ-jjat3psIr_jj5vD~m6*|OV;U@2fgjw&p zz)cQ|QcL}tyrJoQD78?20shyOx*@QnKJiyva}wU3{3|F%fGtu4vmHoq@LrkcOP+YF z&VQM?egyC)At{A1wd_n4k+Ij8z?#aB(O!2#@nK(Y!Up2_uL{mcCw0VL?XiCIqo#Vx z^p+n2G38;w=8wnzhjmD{lrVu@xAf1pltk>EHZX!atN0UswH8U~k%$W7zIlF;KU<~Z zM&V3vT|deL7i+MkJ4!h(GtJc-!K`*Ibi|=q_`@Zpbexr;8AAhTxHI< z&YaJ7G447vo(`HMC=LZ=ktxEF7Fe=87AJ2hUTX4gtI8*o4FW}9vHqTBC}G+fIxG>w zs3Th*jYTr4<8BmQ6o)*JvO3b7Yyaf@i~pm{I{20xq7QJBL}(O|07jgVFea;ni|GQB zyOgU7bsHf^$4}?gKk9;{F8Q(Ly@0PCuU>MIEZ8DnFu%qDS^<{(zS+S>fhBy=F${n!s)ZErs`PZ$n%0G%C;tk4{{;h~-Qvvij zlAKA&T&YYqtay^tyh?-B7gxie<+p8l^QNB7C?!@w{R1aHS~S z;8-kBl7=YVpF<)q3vBF`Ob;nOQQ;x!Ha_B4D~Ku(`4>k#{WM-NjR~{qrV0;VasqRN zmnhf;W~|h2?<#t6@uiwvwhoPRJ9QbUMblQVwTo4%=eF{r(KfAfLj+~dCf`di7IuR0 z&2Sx&ZA!^z-@JZ##Xj9;NDJ6x9eDQ5NXOWC=A2)%YCmw+!Sp+AR!Hj2wG#Xe$IP@QL1o`j3gb!W51Y>I-#bQ$=wsq6ZSVC;te zIE0?>1Y^g8-QtK9qYb?DFSzVxj_cgp~DOmUc{SA*m{1B|qYGf~8_% zfaz`o8l9_vEF24WBTcNNsx2_60#hEQU4pWaJWt3@3*`dI|H~hSsF0j733X45$yr~K zkg4I3yf8_N7rXaBv6zRk2ug$xPKLNOZt@n9hdP*kELg?b1raXXOy+hkq3N*OWxJsO z-VS#K-=2-X2z)r1F1)~U*<0PB7;<91dN11A`Av1cPKZ_geJ2gA^5Cugv&2v9E7=Ni7=PrJ zSSc4kroTwPMcK9(l@6=l9siB>@n^F9nXb{#qT%1)9p$GYlz_hu|0<&kG9CJ2OUnyG z%P_Rg!9BYq)ULK*OA!otWP8o>R%{tB^-fjtIsk()ER4JwEE)cfv83kn`3sz<6+tmE zWSR31)tMCivPBuqdsNG@Y*_V+H|tz=5|{X(Tx>FjeX-=HZEPV7-yMN)7sCw>1b@pg ziRGn%D)zY4Ais<7-BBs}G;fU38b`OBLLE{@Hb~r0h@uP$U_9Zqe7UIJavSp_UKE0- z8tOy7B?ZuU8%0MTCe^zUnaac2JEBK`m+n!aA~ij*5C3*y+mLUhQ!60xzf~nH?(ch7 zVu|lYat$&)7J_WM7;?uf=Cu(-2DtLwhQ*f7D}-X2iSnEl3ac?z$xWbwtE#M=e_n~M zIxQ|nKa&6a?(zsEH^C7=n}qJ3;q*v4!j6jA)1#uyDU%Je0f0fZCQ6CrC1&HT#K*qp1KUSoR$6jZG3F5{3v5lW z`;KIkGgVO?f#6uHZJftIGJ200lqHFH7B0!p$3^wXNhHzc_{{?H9fknhnh9+iP&uxjU3mo^zU#-PZzg-4A7D>ZX*)~#|?cFqdUBYO~ z_whT`pLg{Hh3KXgH^_%Y&~rZ%XQRkA2_d?jT zgDG+nIb;l`U<3DS|-cQW-}gKS*XEzL?ws0(Vf#0 z+a5f^d9NLc{W^G$c7xM_ssb@M8YH6f%4Rp@b^DJuyJ7zJw|^OmxkM}AHrsp#DSra9 z$>@>Yh!!6<8qjheTUpNr-cM|>WowvnpML!rQl2QL95@OIC4e{0%cPess><%f-#D%i zr&R?)P&?Y75N~VG2~^Ob{DKlN_#SOYx*HVh4FbAJmKk{Z`t1AR0&*V750-WrMVmw2 zZ^q|NI!6`AHKc&Gl1J4ftns@_Iy3wqq;h2Ijx-p6cUSm7NYMBVr$v~-**maAkY6>k zVpG5itjM|~JF?|x8JUW>0^F_4bM-hNAbTZ8v`QaE8+(d>?>Xn(3T+Z1D!IvVtHWJ4 zgKDBaqiN)%ezuc%15;V)><_VbCApvf=2e7#&J&+*t=j5mIPd8;{)6mzN$lr3^>@wy zzsI!ggoI~%%Y@X_>`0MUTGY+swB(yDve4GqMVy~NqOUkA(V1yi&Kr<3W) zk^1YLmmU{EQiIdM5B!?F?{T()G*}Og2K@Fty&eDIO@>nWw|)T^|E|b&FNY5+;(($~ zt%}RM11W`(tz;utHGk7LsEW&%?W(7?1< zDvz>DG2uJADbML#oL;GKL68Sg6j`&B$z)!IKvo=;;hHjhU!=6ymPLzWFbcExTsn)L z&qF?Q!LI!t;TsgAEE_V55c7ZW;^Et5C}>dUX8ezl`rJm@OZA?AU$<7va7OBMzs8j1 z>;(%GUw9Rde7bmS=&m)%q-YY9EA$U7-cqdtRdDF}t@l zYJ#op$|qT+lDXQ3=t{ocvqB}5`(2+BXk~ROWUba_R_Z_vlm}gx3h6zsN`0j6ZB3Se z)^y_D*CQ`!->iS;h58$`PaRNC-LqWRzoL1TFm%y7Wy5_4t4OLEr#BiG6@lHEi=2}% z2tzlV2F`r3T+YYyz@G(Zyd2La)5RPi$MwDCNq91z`tJN>x`fd4{K?dVHK`p2K}y|B z7tp$Hl~)JI`ZljgBr=J$zrVq8sH)R2SfikLx8GDR+qXKJI(QP-9l$nGE8jJm^k-FX zKuhR%09(N8kqyyh>Ugbi3yH7!yC&kYEpKMaC&*vRGtw#{BY@)|+NvrMa6xX6JW>l4 zJBC4!pMIt(Lg&YI0~-u?kC@)Tucn+BD#j=Vx?HaPut5G32d>0sEPrA9{hGRkkR2(8fb zEPxST=F*pTG|&rxvgK2)BziPRRQoV*rp|$16GFeuo!;tF6z(5dY`j6(?Y+ z-t(23IE)YrrPQ1oEm~k!& zvoWaZn-RDY$2?sspVUA`LuVd=9Uq|Kke+ZaG_eSTT0 zdbmQg*r~isE!#hDUccmT`M%Z;m6|$5VY)(e-^wj&E^6N!&K2S4FR^+)0LzqYg#KLA zH0E!(8{u66@EuPwRM${RCxX7d6nl~Za)qqcJPXG0_q&7x=99pSCrSN^4N)i=j?&JG z^!1$oaTkVdRg}+5>lvWN$@lQVDvpjjCM#W3)uTq(o?WBhx7;|Hz1T-CgmULn{;dh6 znv*Hbw2RA9#DvZzbwRyJBJ`9o*M(%Rhest|djxWLM+MK-$T(B>U86^$#uzNO?|m;z zzU%FvWg&ZOXe3jdZr6y-xn4X~0xYyCW!cuCu-u+@U5W54!xq-(NL|XC@mPpZRo<61 z+K&JfKyap*77C>kkLrb?^J$Gr4}?KZq+6sNVl;l zIVvHQuD%fv_%x4JDGbmhN-+>A2VSe5f~103;#GF z;qb;iev(&GJN#FLrVYw6xI(sw`Q@8QiTJ*V+PmLWPGBIun{4nG2heZu1b)ZgZ zZ2))Yt#y6<-{p-ZuX*|8B@7V^)&PZ=-%P!VbvA5Jb zFm8Q0)vslFr(Ilv;}GBAa0?@5s=QYv%XulujKciR`~23%#$%5kaf)8>yB!Q6ol93756@|JsX*5Ij$w;4Gj&+%Mm?vC^NRx^mk%M-^v@lPfvD4hDU`C_^} zSo;(3p0gM?>*+w)wI5;@?2woBJJExpand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | curl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-22576 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://hackerone.com/reports/1526328
https://nvd.nist.gov/vuln/detail/CVE-2022-22576
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| -| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl | CVE-2022-27775 | HIGH | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://hackerone.com/reports/1546268
https://nvd.nist.gov/vuln/detail/CVE-2022-27775
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27774 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl | CVE-2022-27776 | MEDIUM | 7.80.0-r0 | 7.80.0-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | ssl_client | CVE-2022-28391 | CRITICAL | 1.34.1-r4 | 1.34.1-r5 |
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
| | zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| -#### Container: tccr.io/truecharts/trilium-notes:v0.52.2@sha256:848715471d8f09800f56c48aef30c419d8f2150e645ad37562ad2bd1d76699a8 (alpine 3.15.4) +#### Container: tccr.io/truecharts/trilium-notes:v0.52.3@sha256:7b7e053e9610d80851c79e3fcb9b4149bbeaf3ecd823b2161e68daa313f5adeb (alpine 3.15.4) **alpine** @@ -78,4 +78,4 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | dicer | CVE-2022-24434 | HIGH | 0.2.5 | |
Expand...https://github.com/advisories/GHSA-wm7h-9275-46v2
https://github.com/mscdex/busboy/issues/250
https://github.com/mscdex/dicer/pull/22
https://github.com/mscdex/dicer/pull/22/commits/b7fca2e93e8e9d4439d8acc5c02f5e54a0112dac
https://nvd.nist.gov/vuln/detail/CVE-2022-24434
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865
https://snyk.io/vuln/SNYK-JS-DICER-2311764
| -| npm | CVE-2022-29244 | MEDIUM | 8.5.5 | 8.11.0 |
Expand...https://github.com/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/nodejs/node/pull/43210
https://github.com/nodejs/node/releases/tag/v16.15.1
https://github.com/nodejs/node/releases/tag/v17.9.1
https://github.com/nodejs/node/releases/tag/v18.3.0
https://github.com/npm/cli/releases/tag/v8.11.0
https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/npm/cli/tree/latest/workspaces/libnpmpack
https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish
https://github.com/npm/npm-packlist
| +| npm | CVE-2022-29244 | MEDIUM | 8.5.5 | 8.11.0 |
Expand...https://github.com/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/nodejs/node/pull/43210
https://github.com/nodejs/node/releases/tag/v16.15.1
https://github.com/nodejs/node/releases/tag/v17.9.1
https://github.com/nodejs/node/releases/tag/v18.3.0
https://github.com/npm/cli/releases/tag/v8.11.0
https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52
https://github.com/npm/cli/tree/latest/workspaces/libnpmpack
https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish
https://github.com/npm/npm-packlist
https://nvd.nist.gov/vuln/detail/CVE-2022-29244
| diff --git a/stable/trilium-notes/5.0.2/templates/common.yaml b/stable/trilium-notes/5.0.2/templates/common.yaml new file mode 100644 index 00000000000..c1a366e1cf0 --- /dev/null +++ b/stable/trilium-notes/5.0.2/templates/common.yaml @@ -0,0 +1 @@ +{{ include "tc.common.loader.all" . }} diff --git a/stable/trilium-notes/5.0.2/values.yaml b/stable/trilium-notes/5.0.2/values.yaml new file mode 100644 index 00000000000..e69de29bb2d