diff --git a/stable/guacd/0.0.12/CHANGELOG.md b/stable/guacd/0.0.13/CHANGELOG.md
similarity index 90%
rename from stable/guacd/0.0.12/CHANGELOG.md
rename to stable/guacd/0.0.13/CHANGELOG.md
index 5c835d66f1d..4ae2fd2dbeb 100644
--- a/stable/guacd/0.0.12/CHANGELOG.md
+++ b/stable/guacd/0.0.13/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [guacd-0.0.13](https://github.com/truecharts/apps/compare/guacd-0.0.12...guacd-0.0.13) (2022-01-12)
+
+#### Fix
+
+* run as root as it's needed for freerdp ([#1695](https://github.com/truecharts/apps/issues/1695))
+
+
+
### [guacd-0.0.12](https://github.com/truecharts/apps/compare/guacd-0.0.11...guacd-0.0.12) (2022-01-11)
@@ -88,12 +97,3 @@
#### Chore
-* update helm general non-major helm releases ([#1535](https://github.com/truecharts/apps/issues/1535))
-
-
-
-
-### [guacd-0.0.2](https://github.com/truecharts/apps/compare/guacd-0.0.1...guacd-0.0.2) (2021-12-13)
-
-#### Chore
-
diff --git a/stable/guacd/0.0.12/CONFIG.md b/stable/guacd/0.0.13/CONFIG.md
similarity index 100%
rename from stable/guacd/0.0.12/CONFIG.md
rename to stable/guacd/0.0.13/CONFIG.md
diff --git a/stable/guacd/0.0.12/Chart.lock b/stable/guacd/0.0.13/Chart.lock
similarity index 78%
rename from stable/guacd/0.0.12/Chart.lock
rename to stable/guacd/0.0.13/Chart.lock
index b68771d7bf7..e5db1fd5064 100644
--- a/stable/guacd/0.0.12/Chart.lock
+++ b/stable/guacd/0.0.13/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.10.6
digest: sha256:047f6a869b6f4f66b8c440be00bc5e27de8f25332ec427cdf19ac76a465e9bc9
-generated: "2022-01-11T18:00:11.902716798Z"
+generated: "2022-01-12T17:13:29.265105141Z"
diff --git a/stable/guacd/0.0.12/Chart.yaml b/stable/guacd/0.0.13/Chart.yaml
similarity index 83%
rename from stable/guacd/0.0.12/Chart.yaml
rename to stable/guacd/0.0.13/Chart.yaml
index 5521c7fdfd0..0ca50887617 100644
--- a/stable/guacd/0.0.12/Chart.yaml
+++ b/stable/guacd/0.0.13/Chart.yaml
@@ -1,7 +1,7 @@
apiVersion: v2
kubeVersion: ">=1.16.0-0"
name: guacd
-version: 0.0.12
+version: 0.0.13
appVersion: "1.4.0"
description: Guacd - Apache Guacamole is a clientless remote desktop gateway.
type: application
@@ -10,8 +10,11 @@ home: https://github.com/truecharts/apps/tree/master/charts/stable/guacd
icon: https://truecharts.org/_static/img/appicons/guacd-icon.png
keywords:
- guacd
+ - guacamole
+ - remote
sources:
- - https://hub.docker.com/r/linuxserver/guacd
+ - https://hub.docker.com/r/guacamole/guacd
+ - https://github.com/apache/guacamole-server
dependencies:
- name: common
repository: https://truecharts.org
diff --git a/stable/guacd/0.0.12/README.md b/stable/guacd/0.0.13/README.md
similarity index 93%
rename from stable/guacd/0.0.12/README.md
rename to stable/guacd/0.0.13/README.md
index adacb4ed2d8..f1df7231fdc 100644
--- a/stable/guacd/0.0.12/README.md
+++ b/stable/guacd/0.0.13/README.md
@@ -7,7 +7,8 @@ TrueCharts are designed to be installed as TrueNAS SCALE app only. We can not gu
## Source Code
-*
+*
+*
## Requirements
diff --git a/stable/guacd/0.0.12/app-readme.md b/stable/guacd/0.0.13/app-readme.md
similarity index 100%
rename from stable/guacd/0.0.12/app-readme.md
rename to stable/guacd/0.0.13/app-readme.md
diff --git a/stable/guacd/0.0.12/charts/common-8.10.6.tgz b/stable/guacd/0.0.13/charts/common-8.10.6.tgz
similarity index 100%
rename from stable/guacd/0.0.12/charts/common-8.10.6.tgz
rename to stable/guacd/0.0.13/charts/common-8.10.6.tgz
diff --git a/stable/guacd/0.0.12/helm-values.md b/stable/guacd/0.0.13/helm-values.md
similarity index 83%
rename from stable/guacd/0.0.12/helm-values.md
rename to stable/guacd/0.0.13/helm-values.md
index ca296738d00..746d8c8341d 100644
--- a/stable/guacd/0.0.12/helm-values.md
+++ b/stable/guacd/0.0.13/helm-values.md
@@ -14,6 +14,10 @@ You will, however, be able to use all values referenced in the common chart here
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/guacamole-server"` | |
| image.tag | string | `"v1.4.0@sha256:6b67e159e4e24524bf025a419062249763967085f6111d73d9f3d9ee7b0c13ee"` | |
+| podSecurityContext.runAsGroup | int | `0` | |
+| podSecurityContext.runAsUser | int | `0` | |
+| securityContext.readOnlyRootFilesystem | bool | `false` | |
+| securityContext.runAsNonRoot | bool | `false` | |
| service.main.ports.main.port | int | `4822` | |
| service.main.ports.main.targetPort | int | `4822` | |
diff --git a/stable/guacd/0.0.12/ix_values.yaml b/stable/guacd/0.0.13/ix_values.yaml
similarity index 67%
rename from stable/guacd/0.0.12/ix_values.yaml
rename to stable/guacd/0.0.13/ix_values.yaml
index 3f059aff737..70152ccd7c4 100644
--- a/stable/guacd/0.0.12/ix_values.yaml
+++ b/stable/guacd/0.0.13/ix_values.yaml
@@ -3,6 +3,14 @@ image:
pullPolicy: IfNotPresent
tag: v1.4.0@sha256:6b67e159e4e24524bf025a419062249763967085f6111d73d9f3d9ee7b0c13ee
+securityContext:
+ readOnlyRootFilesystem: false
+ runAsNonRoot: false
+
+podSecurityContext:
+ runAsUser: 0
+ runAsGroup: 0
+
service:
main:
ports:
diff --git a/stable/guacd/0.0.12/questions.yaml b/stable/guacd/0.0.13/questions.yaml
similarity index 99%
rename from stable/guacd/0.0.12/questions.yaml
rename to stable/guacd/0.0.13/questions.yaml
index 75b80c02d06..59e96fb7e40 100644
--- a/stable/guacd/0.0.12/questions.yaml
+++ b/stable/guacd/0.0.13/questions.yaml
@@ -1099,7 +1099,7 @@ questions:
label: "ReadOnly Root Filesystem"
schema:
type: boolean
- default: true
+ default: false
- variable: allowPrivilegeEscalation
label: "Allow Privilege Escalation"
schema:
@@ -1109,7 +1109,7 @@ questions:
label: "runAsNonRoot"
schema:
type: boolean
- default: true
+ default: false
- variable: podSecurityContext
group: "Security and Permissions"
@@ -1122,13 +1122,13 @@ questions:
description: "The UserID of the user running the application"
schema:
type: int
- default: 568
+ default: 0
- variable: runAsGroup
label: "runAsGroup"
description: The groupID this App of the user running the application"
schema:
type: int
- default: 568
+ default: 0
- variable: fsGroup
label: "fsGroup"
description: "The group that should own ALL storage."
diff --git a/stable/guacd/0.0.12/security.md b/stable/guacd/0.0.13/security.md
similarity index 99%
rename from stable/guacd/0.0.12/security.md
rename to stable/guacd/0.0.13/security.md
index f0b94412e97..7bf27684fb8 100644
--- a/stable/guacd/0.0.12/security.md
+++ b/stable/guacd/0.0.13/security.md
@@ -18,7 +18,9 @@ hide:
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Expand...
The container should drop all default capabilities and add only those that are needed for its execution.
Container 'RELEASE-NAME-guacd' of Deployment 'RELEASE-NAME-guacd' should add 'ALL' to 'securityContext.capabilities.drop' | Expand...
https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
|
+| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'RELEASE-NAME-guacd' of Deployment 'RELEASE-NAME-guacd' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'autopermissions' of Deployment 'RELEASE-NAME-guacd' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
+| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'RELEASE-NAME-guacd' of Deployment 'RELEASE-NAME-guacd' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'autopermissions' of Deployment 'RELEASE-NAME-guacd' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | Expand...
Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.
Container 'RELEASE-NAME-guacd' of Deployment 'RELEASE-NAME-guacd' should set 'securityContext.runAsUser' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
|
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | Expand...
Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.
Container 'autopermissions' of Deployment 'RELEASE-NAME-guacd' should set 'securityContext.runAsUser' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
|
@@ -316,7 +318,7 @@ hide:
| liblz4-1 | CVE-2019-17543 | LOW | 1.8.3-1+deb10u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| libmount1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libncursesw6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | Expand...
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
-| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.3.0-2+deb10u2 | | Expand...
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
|
+| libopenjp2-7 | CVE-2021-3575 | HIGH | 2.3.0-2+deb10u2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
|
| libopenjp2-7 | CVE-2019-12973 | MEDIUM | 2.3.0-2+deb10u2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
http://www.securityfocus.com/bid/108900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973
https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3
https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503
https://linux.oracle.com/cve/CVE-2019-12973.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html
https://security.gentoo.org/glsa/202101-29
https://www.oracle.com/security-alerts/cpujul2020.html
|
| libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.3.0-2+deb10u2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338
https://github.com/uclouvain/openjpeg/issues/1338
https://github.com/uclouvain/openjpeg/pull/1346
https://linux.oracle.com/cve/CVE-2021-29338.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
|
| libopenjp2-7 | CVE-2016-10505 | LOW | 2.3.0-2+deb10u2 | | Expand...
https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://security.gentoo.org/glsa/201710-26
|
@@ -413,11 +415,11 @@ hide:
| libswscale5 | CVE-2021-38094 | LOW | 7:4.1.8-0+deb10u1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38094
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23
https://trac.ffmpeg.org/ticket/8263
|
| libsystemd0 | CVE-2019-3843 | HIGH | 247.3-6~bpo10+1 | | Expand...
http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libsystemd0 | CVE-2019-3844 | HIGH | 247.3-6~bpo10+1 | | Expand...
http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
+| libsystemd0 | CVE-2021-3997 | MEDIUM | 247.3-6~bpo10+1 | | Expand...
https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| libsystemd0 | CVE-2013-4392 | LOW | 247.3-6~bpo10+1 | | Expand...
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
| libsystemd0 | CVE-2019-20386 | LOW | 247.3-6~bpo10+1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libsystemd0 | CVE-2020-13529 | LOW | 247.3-6~bpo10+1 | | Expand...
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
|
| libsystemd0 | CVE-2020-13776 | LOW | 247.3-6~bpo10+1 | | Expand...
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
|
-| libsystemd0 | CVE-2021-3997 | UNKNOWN | 247.3-6~bpo10+1 | | Expand...
|
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.13-3 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libtiff5 | CVE-2014-8130 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...
http://bugzilla.maptools.org/show_bug.cgi?id=2483
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://openwall.com/lists/oss-security/2015/01/24/15
http://rhn.redhat.com/errata/RHSA-2016-1546.html
http://rhn.redhat.com/errata/RHSA-2016-1547.html
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
http://www.securityfocus.com/bid/72353
http://www.securitytracker.com/id/1032760
https://bugzilla.redhat.com/show_bug.cgi?id=1185817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
https://linux.oracle.com/cve/CVE-2014-8130.html
https://linux.oracle.com/errata/ELSA-2016-1547.html
https://security.gentoo.org/glsa/201701-16
https://ubuntu.com/security/notices/USN-2553-1
|
| libtiff5 | CVE-2017-16232 | LOW | 4.1.0+git191117-2~deb10u3 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
|
@@ -431,11 +433,11 @@ hide:
| libtinfo6 | CVE-2021-39537 | LOW | 6.1+20181013-2+deb10u2 | | Expand...
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
|
| libudev1 | CVE-2019-3843 | HIGH | 247.3-6~bpo10+1 | | Expand...
http://www.securityfocus.com/bid/108116
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843
https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)
https://linux.oracle.com/cve/CVE-2019-3843.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libudev1 | CVE-2019-3844 | HIGH | 247.3-6~bpo10+1 | | Expand...
http://www.securityfocus.com/bid/108096
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844
https://linux.oracle.com/cve/CVE-2019-3844.html
https://linux.oracle.com/errata/ELSA-2020-1794.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190619-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
+| libudev1 | CVE-2021-3997 | MEDIUM | 247.3-6~bpo10+1 | | Expand...
https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| libudev1 | CVE-2013-4392 | LOW | 247.3-6~bpo10+1 | | Expand...
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
| libudev1 | CVE-2019-20386 | LOW | 247.3-6~bpo10+1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://linux.oracle.com/cve/CVE-2019-20386.html
https://linux.oracle.com/errata/ELSA-2020-4553.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/
https://security.netapp.com/advisory/ntap-20200210-0002/
https://ubuntu.com/security/notices/USN-4269-1
https://usn.ubuntu.com/4269-1/
|
| libudev1 | CVE-2020-13529 | LOW | 247.3-6~bpo10+1 | | Expand...
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
|
| libudev1 | CVE-2020-13776 | LOW | 247.3-6~bpo10+1 | | Expand...
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://security.netapp.com/advisory/ntap-20200611-0003/
|
-| libudev1 | CVE-2021-3997 | UNKNOWN | 247.3-6~bpo10+1 | | Expand...
|
| libuuid1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | | Expand...
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libuv1 | CVE-2020-8252 | LOW | 1.24.1-1+deb10u1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252
https://hackerone.com/reports/965914
https://linux.oracle.com/cve/CVE-2020-8252.html
https://linux.oracle.com/errata/ELSA-2021-0548.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/#fs-realpath-native-on-may-cause-buffer-overflow-medium-cve-2020-8252
https://security.gentoo.org/glsa/202009-15
https://security.netapp.com/advisory/ntap-20201009-0004/
https://ubuntu.com/security/notices/USN-4548-1
https://usn.ubuntu.com/4548-1/
|
| libvncclient1 | CVE-2017-18922 | CRITICAL | 0.9.11+dfsg-1.3+deb10u4 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html
http://www.openwall.com/lists/oss-security/2020/06/30/3
https://bugzilla.redhat.com/show_bug.cgi?id=1852356
https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18922
https://github.com/LibVNC/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433
https://linux.oracle.com/cve/CVE-2017-18922.html
https://linux.oracle.com/errata/ELSA-2020-3385.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVP7TJVYJDXDFRHVQ3ENEN3H354QPXEZ/
https://ubuntu.com/security/notices/USN-4407-1
https://usn.ubuntu.com/4407-1/
https://www.openwall.com/lists/oss-security/2020/06/30/2
|
@@ -499,7 +501,7 @@ hide:
| passwd | CVE-2013-4235 | LOW | 1:4.5-1.1 | | Expand...
https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
|
| passwd | CVE-2018-7169 | LOW | 1:4.5-1.1 | | Expand...
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
|
| passwd | CVE-2019-19882 | LOW | 1:4.5-1.1 | | Expand...
https://bugs.archlinux.org/task/64836
https://bugs.gentoo.org/702252
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
https://github.com/shadow-maint/shadow/pull/199
https://github.com/void-linux/void-packages/pull/17580
https://security.gentoo.org/glsa/202008-09
|
-| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | Expand...
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
+| perl-base | CVE-2020-16156 | HIGH | 5.28.1-6+deb10u1 | | Expand...
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
| perl-base | CVE-2011-4116 | LOW | 5.28.1-6+deb10u1 | | Expand...
http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
|
| tar | CVE-2005-2541 | LOW | 1.30+dfsg-6 | | Expand...
http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
|
| tar | CVE-2019-9923 | LOW | 1.30+dfsg-6 | | Expand...
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://ubuntu.com/security/notices/USN-4692-1
|
diff --git a/stable/guacd/0.0.12/templates/common.yaml b/stable/guacd/0.0.13/templates/common.yaml
similarity index 100%
rename from stable/guacd/0.0.12/templates/common.yaml
rename to stable/guacd/0.0.13/templates/common.yaml
diff --git a/stable/guacd/0.0.12/values.yaml b/stable/guacd/0.0.13/values.yaml
similarity index 100%
rename from stable/guacd/0.0.12/values.yaml
rename to stable/guacd/0.0.13/values.yaml