From 0a5590e6113053fc1012c5434d1413d2f8e9de90 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Mon, 14 Feb 2022 11:51:39 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../{1.1.62 => 1.1.63}/CHANGELOG.md | 18 ++--- core/prometheus/{1.1.62 => 1.1.63}/CONFIG.md | 0 core/prometheus/{1.1.62 => 1.1.63}/Chart.lock | 2 +- core/prometheus/{1.1.62 => 1.1.63}/Chart.yaml | 2 +- core/prometheus/{1.1.62 => 1.1.63}/README.md | 0 .../{1.1.62 => 1.1.63}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../charts/kube-state-metrics-2.2.4.tgz | Bin .../charts/node-exporter-2.4.1.tgz | Bin .../crds/crd-alertmanager-config.yaml | 0 .../crds/crd-alertmanager.yaml | 0 .../crds/crd-podmonitor.yaml | 0 .../{1.1.62 => 1.1.63}/crds/crd-probes.yaml | 0 .../crds/crd-prometheus.yaml | 0 .../crds/crd-prometheusrules.yaml | 0 .../crds/crd-servicemonitor.yaml | 0 .../crds/crd-thanosrulers.yaml | 0 .../{1.1.62 => 1.1.63}/helm-values.md | 6 +- .../{1.1.62 => 1.1.63}/ix_values.yaml | 6 +- .../{1.1.62 => 1.1.63}/questions.yaml | 0 .../prometheus/{1.1.62 => 1.1.63}/security.md | 0 .../{1.1.62 => 1.1.63}/templates/_helpers.tpl | 0 .../templates/alertmanager/_alertmanager.tpl | 0 .../templates/alertmanager/secrets.yaml | 0 .../alertmanager/serviceaccount.yaml | 0 .../alertmanager/servicemonitor.yaml | 0 .../{1.1.62 => 1.1.63}/templates/common.yaml | 0 .../templates/exporters/core-dns/service.yaml | 0 .../exporters/core-dns/servicemonitor.yaml | 0 .../kube-apiserver/servicemonitor.yaml | 0 .../kube-controller-manager/endpoints.yaml | 0 .../kube-controller-manager/service.yaml | 0 .../servicemonitor.yaml | 0 .../exporters/kube-scheduler/endpoints.yaml | 0 .../exporters/kube-scheduler/service.yaml | 0 .../kube-scheduler/servicemonitor.yaml | 0 .../exporters/kubelet/servicemonitor.yaml | 0 .../templates/operator/_args.tpl | 0 .../templates/operator/configmap.yaml | 0 .../templates/operator/servicemonitor.yaml | 0 .../prometheus/_additionalPrometheusRules.tpl | 0 .../prometheus/_additionalScrapeJobs.tpl | 0 .../templates/prometheus/_prometheus.tpl | 0 .../templates/prometheus/_servicemonitor.tpl | 0 .../templates/prometheus/clusterrole.yaml | 0 .../prometheus/clusterrolebinding.yaml | 0 .../templates/prometheus/serviceaccount.yaml | 0 .../prometheus/{1.1.62 => 1.1.63}/values.yaml | 0 .../mariadb/{1.0.69 => 1.0.70}/CHANGELOG.md | 18 ++--- .../mariadb/{1.0.69 => 1.0.70}/CONFIG.md | 0 .../mariadb/1.0.70}/Chart.lock | 2 +- .../mariadb/{1.0.69 => 1.0.70}/Chart.yaml | 2 +- .../mariadb/{1.0.69 => 1.0.70}/README.md | 0 .../mariadb/{1.0.69 => 1.0.70}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../mariadb/{1.0.69 => 1.0.70}/helm-values.md | 2 +- .../mariadb/{1.0.69 => 1.0.70}/ix_values.yaml | 2 +- .../mariadb/{1.0.69 => 1.0.70}/questions.yaml | 0 .../mariadb/{1.0.69 => 1.0.70}/security.md | 11 ++- .../{1.0.69 => 1.0.70}/templates/common.yaml | 0 .../{1.0.69 => 1.0.70}/templates/secret.yaml | 0 .../mariadb/{1.0.69 => 1.0.70}/values.yaml | 0 .../memcached/{1.0.69 => 1.0.70}/CHANGELOG.md | 18 ++--- .../memcached/{1.0.69 => 1.0.70}/CONFIG.md | 0 .../memcached/{1.0.69 => 1.0.70}/Chart.lock | 2 +- .../memcached/{1.0.69 => 1.0.70}/Chart.yaml | 2 +- .../memcached/{1.0.69 => 1.0.70}/README.md | 0 .../{1.0.69 => 1.0.70}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../{1.0.69 => 1.0.70}/helm-values.md | 2 +- .../{1.0.69 => 1.0.70}/ix_values.yaml | 2 +- .../{1.0.69 => 1.0.70}/questions.yaml | 0 .../memcached/{1.0.69 => 1.0.70}/security.md | 11 ++- .../{1.0.69 => 1.0.70}/templates/common.yaml | 0 .../memcached/{1.0.69 => 1.0.70}/values.yaml | 0 .../redis/{1.0.72 => 1.0.73}/CHANGELOG.md | 18 ++--- dependency/redis/{1.0.72 => 1.0.73}/CONFIG.md | 0 .../redis/{1.0.72 => 1.0.73}/Chart.lock | 2 +- .../redis/{1.0.72 => 1.0.73}/Chart.yaml | 2 +- dependency/redis/{1.0.72 => 1.0.73}/README.md | 0 .../redis/{1.0.72 => 1.0.73}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../redis/{1.0.72 => 1.0.73}/helm-values.md | 2 +- .../redis/{1.0.72 => 1.0.73}/ix_values.yaml | 2 +- .../redis/{1.0.72 => 1.0.73}/questions.yaml | 0 .../redis/{1.0.72 => 1.0.73}/security.md | 11 ++- .../{1.0.72 => 1.0.73}/templates/common.yaml | 0 .../templates/health-configmap.yaml | 0 .../{1.0.72 => 1.0.73}/templates/secret.yaml | 0 .../redis/{1.0.72 => 1.0.73}/values.yaml | 0 .../{0.0.7 => 0.0.8}/CHANGELOG.md | 9 +++ .../minecraft-java/{0.0.7 => 0.0.8}/CONFIG.md | 0 games/minecraft-java/0.0.8/Chart.lock | 6 ++ .../{0.0.7 => 0.0.8}/Chart.yaml | 2 +- .../minecraft-java/{0.0.7 => 0.0.8}/README.md | 0 .../{0.0.7 => 0.0.8}/app-readme.md | 0 .../{0.0.7 => 0.0.8}/charts/common-8.15.2.tgz | Bin .../{0.0.7 => 0.0.8}/ci/base-values.yaml | 0 .../{0.0.7 => 0.0.8}/ci/j11-values.yaml | 2 +- .../{0.0.7 => 0.0.8}/ci/j11j9-values.yaml | 0 .../{0.0.7 => 0.0.8}/ci/j8-values.yaml | 2 +- .../{0.0.7 => 0.0.8}/ci/j8j9-values.yaml | 0 .../{0.0.7 => 0.0.8}/helm-values.md | 6 +- .../{0.0.7 => 0.0.8}/ix_values.yaml | 6 +- .../{0.0.7 => 0.0.8}/questions.yaml | 0 .../{0.0.7 => 0.0.8}/security.md | 0 .../{0.0.7 => 0.0.8}/templates/common.yaml | 0 .../{0.0.7 => 0.0.8}/values.yaml | 0 .../anonaddy/{6.0.35 => 6.0.36}/CHANGELOG.md | 18 ++--- stable/anonaddy/{6.0.35 => 6.0.36}/CONFIG.md | 0 stable/anonaddy/{6.0.35 => 6.0.36}/Chart.lock | 2 +- stable/anonaddy/{6.0.35 => 6.0.36}/Chart.yaml | 4 +- stable/anonaddy/{6.0.35 => 6.0.36}/README.md | 0 .../anonaddy/{6.0.35 => 6.0.36}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../charts/mariadb-1.0.68.tgz | Bin .../charts/redis-1.0.71.tgz | Bin .../{6.0.35 => 6.0.36}/helm-values.md | 2 +- .../{6.0.35 => 6.0.36}/ix_values.yaml | 2 +- .../{6.0.35 => 6.0.36}/questions.yaml | 0 .../anonaddy/{6.0.35 => 6.0.36}/security.md | 18 ++--- .../{6.0.35 => 6.0.36}/templates/_appkey.tpl | 0 .../{6.0.35 => 6.0.36}/templates/common.yaml | 0 .../anonaddy/{6.0.35 => 6.0.36}/values.yaml | 0 .../babybuddy/{5.0.40 => 5.0.41}/CHANGELOG.md | 18 ++--- stable/babybuddy/{5.0.40 => 5.0.41}/CONFIG.md | 0 .../babybuddy/{5.0.40 => 5.0.41}/Chart.lock | 2 +- .../babybuddy/{5.0.40 => 5.0.41}/Chart.yaml | 2 +- stable/babybuddy/{5.0.40 => 5.0.41}/README.md | 0 .../{5.0.40 => 5.0.41}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../charts/postgresql-6.0.66.tgz | Bin .../{5.0.40 => 5.0.41}/helm-values.md | 2 +- .../{5.0.40 => 5.0.41}/ix_values.yaml | 2 +- .../{5.0.40 => 5.0.41}/questions.yaml | 0 .../babybuddy/{5.0.40 => 5.0.41}/security.md | 24 +++--- .../{5.0.40 => 5.0.41}/templates/common.yaml | 0 .../babybuddy/{5.0.40 => 5.0.41}/values.yaml | 0 stable/beets/2.0.43/Chart.lock | 6 -- stable/beets/{2.0.43 => 2.0.44}/CHANGELOG.md | 18 ++--- stable/beets/{2.0.43 => 2.0.44}/CONFIG.md | 0 stable/beets/2.0.44/Chart.lock | 6 ++ stable/beets/{2.0.43 => 2.0.44}/Chart.yaml | 2 +- stable/beets/{2.0.43 => 2.0.44}/README.md | 0 stable/beets/{2.0.43 => 2.0.44}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../beets/{2.0.43 => 2.0.44}/helm-values.md | 2 +- .../beets/{2.0.43 => 2.0.44}/ix_values.yaml | 2 +- .../beets/{2.0.43 => 2.0.44}/questions.yaml | 0 stable/beets/{2.0.43 => 2.0.44}/security.md | 2 +- .../{2.0.43 => 2.0.44}/templates/common.yaml | 0 stable/beets/{2.0.43 => 2.0.44}/values.yaml | 0 stable/booksonic-air/4.0.43/Chart.lock | 6 -- .../{4.0.43 => 4.0.44}/CHANGELOG.md | 18 ++--- .../{4.0.43 => 4.0.44}/CONFIG.md | 0 stable/booksonic-air/4.0.44/Chart.lock | 6 ++ .../{4.0.43 => 4.0.44}/Chart.yaml | 2 +- .../{4.0.43 => 4.0.44}/README.md | 0 .../{4.0.43 => 4.0.44}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../{4.0.43 => 4.0.44}/helm-values.md | 2 +- .../{4.0.43 => 4.0.44}/ix_values.yaml | 2 +- .../{4.0.43 => 4.0.44}/questions.yaml | 0 .../{4.0.43 => 4.0.44}/security.md | 25 +++--- .../{4.0.43 => 4.0.44}/templates/common.yaml | 0 .../{4.0.43 => 4.0.44}/values.yaml | 0 stable/clamav/1.0.8/Chart.lock | 6 -- stable/clamav/{1.0.8 => 1.0.9}/CHANGELOG.md | 18 ++--- stable/clamav/{1.0.8 => 1.0.9}/CONFIG.md | 0 stable/clamav/1.0.9/Chart.lock | 6 ++ stable/clamav/{1.0.8 => 1.0.9}/Chart.yaml | 2 +- stable/clamav/{1.0.8 => 1.0.9}/README.md | 0 stable/clamav/{1.0.8 => 1.0.9}/app-readme.md | 0 .../{1.0.8 => 1.0.9}/charts/common-8.15.2.tgz | Bin stable/clamav/{1.0.8 => 1.0.9}/helm-values.md | 2 +- stable/clamav/{1.0.8 => 1.0.9}/ix_values.yaml | 2 +- stable/clamav/{1.0.8 => 1.0.9}/questions.yaml | 0 stable/clamav/{1.0.8 => 1.0.9}/security.md | 4 +- .../{1.0.8 => 1.0.9}/templates/common.yaml | 0 stable/clamav/{1.0.8 => 1.0.9}/values.yaml | 0 stable/code-server/2.1.24/Chart.lock | 6 -- .../{2.1.24 => 2.1.25}/CHANGELOG.md | 18 ++--- .../code-server/{2.1.24 => 2.1.25}/CONFIG.md | 0 stable/code-server/2.1.25/Chart.lock | 6 ++ .../code-server/{2.1.24 => 2.1.25}/Chart.yaml | 2 +- .../code-server/{2.1.24 => 2.1.25}/README.md | 0 .../{2.1.24 => 2.1.25}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../{2.1.24 => 2.1.25}/helm-values.md | 2 +- .../{2.1.24 => 2.1.25}/ix_values.yaml | 2 +- .../{2.1.24 => 2.1.25}/questions.yaml | 0 .../{2.1.24 => 2.1.25}/security.md | 74 ++++++++++-------- .../{2.1.24 => 2.1.25}/templates/common.yaml | 0 .../{2.1.24 => 2.1.25}/values.yaml | 0 stable/filezilla/2.0.39/Chart.lock | 6 -- .../filezilla/{2.0.39 => 2.0.41}/CHANGELOG.md | 18 ++--- stable/filezilla/{2.0.39 => 2.0.41}/CONFIG.md | 0 stable/filezilla/2.0.41/Chart.lock | 6 ++ .../filezilla/{2.0.39 => 2.0.41}/Chart.yaml | 4 +- stable/filezilla/{2.0.39 => 2.0.41}/README.md | 0 .../{2.0.39 => 2.0.41}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../{2.0.39 => 2.0.41}/helm-values.md | 2 +- .../{2.0.39 => 2.0.41}/ix_values.yaml | 2 +- .../{2.0.39 => 2.0.41}/questions.yaml | 0 .../filezilla/{2.0.39 => 2.0.41}/security.md | 49 ++++++++++-- .../{2.0.39 => 2.0.41}/templates/common.yaml | 0 .../filezilla/{2.0.39 => 2.0.41}/values.yaml | 0 stable/grafana/2.0.40/Chart.lock | 6 -- .../grafana/{2.0.40 => 2.0.41}/CHANGELOG.md | 18 ++--- stable/grafana/{2.0.40 => 2.0.41}/CONFIG.md | 0 .../grafana/2.0.41}/Chart.lock | 2 +- stable/grafana/{2.0.40 => 2.0.41}/Chart.yaml | 2 +- stable/grafana/{2.0.40 => 2.0.41}/README.md | 0 .../grafana/{2.0.40 => 2.0.41}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../grafana/{2.0.40 => 2.0.41}/helm-values.md | 2 +- .../grafana/{2.0.40 => 2.0.41}/ix_values.yaml | 2 +- .../grafana/{2.0.40 => 2.0.41}/questions.yaml | 0 stable/grafana/{2.0.40 => 2.0.41}/security.md | 23 ++---- .../{2.0.40 => 2.0.41}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 0 .../templates/servicemonitor.yaml | 0 stable/grafana/{2.0.40 => 2.0.41}/values.yaml | 0 stable/grocy/9.0.44/Chart.lock | 6 -- stable/grocy/{9.0.44 => 9.0.45}/CHANGELOG.md | 18 ++--- stable/grocy/{9.0.44 => 9.0.45}/CONFIG.md | 0 stable/grocy/9.0.45/Chart.lock | 6 ++ stable/grocy/{9.0.44 => 9.0.45}/Chart.yaml | 2 +- stable/grocy/{9.0.44 => 9.0.45}/README.md | 0 stable/grocy/{9.0.44 => 9.0.45}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../grocy/{9.0.44 => 9.0.45}/helm-values.md | 2 +- .../grocy/{9.0.44 => 9.0.45}/ix_values.yaml | 2 +- .../grocy/{9.0.44 => 9.0.45}/questions.yaml | 0 stable/grocy/{9.0.44 => 9.0.45}/security.md | 4 +- .../{9.0.44 => 9.0.45}/templates/common.yaml | 0 stable/grocy/{9.0.44 => 9.0.45}/values.yaml | 0 stable/lazylibrarian/9.0.55/Chart.lock | 6 -- .../{9.0.55 => 9.0.56}/CHANGELOG.md | 18 ++--- .../{9.0.55 => 9.0.56}/CONFIG.md | 0 stable/lazylibrarian/9.0.56/Chart.lock | 6 ++ .../{9.0.55 => 9.0.56}/Chart.yaml | 2 +- .../{9.0.55 => 9.0.56}/README.md | 0 .../{9.0.55 => 9.0.56}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../{9.0.55 => 9.0.56}/helm-values.md | 2 +- .../{9.0.55 => 9.0.56}/ix_values.yaml | 2 +- .../{9.0.55 => 9.0.56}/questions.yaml | 0 .../{9.0.55 => 9.0.56}/security.md | 20 ++--- .../{9.0.55 => 9.0.56}/templates/common.yaml | 0 .../{9.0.55 => 9.0.56}/values.yaml | 0 .../librephotos/{1.0.0 => 1.0.1}/CHANGELOG.md | 9 +++ stable/librephotos/{1.0.0 => 1.0.1}/CONFIG.md | 0 .../librephotos/{1.0.0 => 1.0.1}/Chart.lock | 2 +- .../librephotos/{1.0.0 => 1.0.1}/Chart.yaml | 4 +- stable/librephotos/{1.0.0 => 1.0.1}/README.md | 0 .../{1.0.0 => 1.0.1}/app-readme.md | 0 .../{1.0.0 => 1.0.1}/charts/common-8.15.2.tgz | Bin .../charts/postgresql-6.0.66.tgz | Bin .../{1.0.0 => 1.0.1}/charts/redis-1.0.71.tgz | Bin .../{1.0.0 => 1.0.1}/helm-values.md | 6 +- .../{1.0.0 => 1.0.1}/ix_values.yaml | 6 +- .../{1.0.0 => 1.0.1}/questions.yaml | 0 .../librephotos/{1.0.0 => 1.0.1}/security.md | 8 +- .../{1.0.0 => 1.0.1}/templates/_secrets.tpl | 0 .../{1.0.0 => 1.0.1}/templates/common.yaml | 0 .../{1.0.0 => 1.0.1}/templates/configmap.yaml | 0 .../librephotos/{1.0.0 => 1.0.1}/values.yaml | 0 stable/littlelink/4.0.60/Chart.lock | 6 -- .../{4.0.60 => 4.0.61}/CHANGELOG.md | 18 ++--- .../littlelink/{4.0.60 => 4.0.61}/CONFIG.md | 0 stable/littlelink/4.0.61/Chart.lock | 6 ++ .../littlelink/{4.0.60 => 4.0.61}/Chart.yaml | 2 +- .../littlelink/{4.0.60 => 4.0.61}/README.md | 0 .../{4.0.60 => 4.0.61}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../{4.0.60 => 4.0.61}/helm-values.md | 2 +- .../{4.0.60 => 4.0.61}/ix_values.yaml | 2 +- .../{4.0.60 => 4.0.61}/questions.yaml | 0 .../littlelink/{4.0.60 => 4.0.61}/security.md | 4 +- .../templates/_configmap.tpl | 0 .../{4.0.60 => 4.0.61}/templates/common.yaml | 0 .../littlelink/{4.0.60 => 4.0.61}/values.yaml | 0 stable/ombi/9.0.47/Chart.lock | 6 -- stable/ombi/{9.0.47 => 9.0.48}/CHANGELOG.md | 18 ++--- stable/ombi/{9.0.47 => 9.0.48}/CONFIG.md | 0 stable/ombi/9.0.48/Chart.lock | 6 ++ stable/ombi/{9.0.47 => 9.0.48}/Chart.yaml | 4 +- stable/ombi/{9.0.47 => 9.0.48}/README.md | 0 stable/ombi/{9.0.47 => 9.0.48}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin stable/ombi/{9.0.47 => 9.0.48}/helm-values.md | 2 +- stable/ombi/{9.0.47 => 9.0.48}/ix_values.yaml | 2 +- stable/ombi/{9.0.47 => 9.0.48}/questions.yaml | 0 stable/ombi/{9.0.47 => 9.0.48}/security.md | 56 ++++++------- .../{9.0.47 => 9.0.48}/templates/common.yaml | 0 stable/ombi/{9.0.47 => 9.0.48}/values.yaml | 0 stable/piaware/4.0.54/Chart.lock | 6 -- .../piaware/{4.0.54 => 4.0.55}/CHANGELOG.md | 18 ++--- stable/piaware/{4.0.54 => 4.0.55}/CONFIG.md | 0 stable/piaware/4.0.55/Chart.lock | 6 ++ stable/piaware/{4.0.54 => 4.0.55}/Chart.yaml | 2 +- stable/piaware/{4.0.54 => 4.0.55}/README.md | 0 .../piaware/{4.0.54 => 4.0.55}/app-readme.md | 0 .../charts/common-8.15.2.tgz | Bin .../{4.0.54 => 4.0.55}/ci/ct-values.yaml | 0 .../piaware/{4.0.54 => 4.0.55}/helm-values.md | 2 +- .../piaware/{4.0.54 => 4.0.55}/ix_values.yaml | 2 +- .../piaware/{4.0.54 => 4.0.55}/questions.yaml | 0 stable/piaware/{4.0.54 => 4.0.55}/security.md | 24 +++--- .../{4.0.54 => 4.0.55}/templates/common.yaml | 0 stable/piaware/{4.0.54 => 4.0.55}/values.yaml | 0 313 files changed, 518 insertions(+), 472 deletions(-) rename core/prometheus/{1.1.62 => 1.1.63}/CHANGELOG.md (91%) rename core/prometheus/{1.1.62 => 1.1.63}/CONFIG.md (100%) rename core/prometheus/{1.1.62 => 1.1.63}/Chart.lock (88%) rename core/prometheus/{1.1.62 => 1.1.63}/Chart.yaml (98%) rename core/prometheus/{1.1.62 => 1.1.63}/README.md (100%) rename core/prometheus/{1.1.62 => 1.1.63}/app-readme.md (100%) rename core/prometheus/{1.1.62 => 1.1.63}/charts/common-8.15.2.tgz (100%) rename core/prometheus/{1.1.62 => 1.1.63}/charts/kube-state-metrics-2.2.4.tgz (100%) rename core/prometheus/{1.1.62 => 1.1.63}/charts/node-exporter-2.4.1.tgz (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-alertmanager-config.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-alertmanager.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-podmonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-probes.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-prometheus.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-prometheusrules.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/crds/crd-thanosrulers.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/helm-values.md (98%) rename core/prometheus/{1.1.62 => 1.1.63}/ix_values.yaml (99%) rename core/prometheus/{1.1.62 => 1.1.63}/questions.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/security.md (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/_helpers.tpl (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/alertmanager/_alertmanager.tpl (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/alertmanager/secrets.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/alertmanager/serviceaccount.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/alertmanager/servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/common.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/core-dns/service.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/core-dns/servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kube-apiserver/servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kube-controller-manager/endpoints.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kube-controller-manager/service.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kube-controller-manager/servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kube-scheduler/endpoints.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kube-scheduler/service.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kube-scheduler/servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/exporters/kubelet/servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/operator/_args.tpl (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/operator/configmap.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/operator/servicemonitor.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/prometheus/_additionalPrometheusRules.tpl (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/prometheus/_additionalScrapeJobs.tpl (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/prometheus/_prometheus.tpl (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/prometheus/_servicemonitor.tpl (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/prometheus/clusterrole.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/prometheus/clusterrolebinding.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/templates/prometheus/serviceaccount.yaml (100%) rename core/prometheus/{1.1.62 => 1.1.63}/values.yaml (100%) rename dependency/mariadb/{1.0.69 => 1.0.70}/CHANGELOG.md (91%) rename dependency/mariadb/{1.0.69 => 1.0.70}/CONFIG.md (100%) rename {games/minecraft-java/0.0.7 => dependency/mariadb/1.0.70}/Chart.lock (78%) rename dependency/mariadb/{1.0.69 => 1.0.70}/Chart.yaml (98%) rename dependency/mariadb/{1.0.69 => 1.0.70}/README.md (100%) rename dependency/mariadb/{1.0.69 => 1.0.70}/app-readme.md (100%) rename dependency/mariadb/{1.0.69 => 1.0.70}/charts/common-8.15.2.tgz (100%) rename dependency/mariadb/{1.0.69 => 1.0.70}/helm-values.md (97%) rename dependency/mariadb/{1.0.69 => 1.0.70}/ix_values.yaml (97%) rename dependency/mariadb/{1.0.69 => 1.0.70}/questions.yaml (100%) rename dependency/mariadb/{1.0.69 => 1.0.70}/security.md (99%) rename dependency/mariadb/{1.0.69 => 1.0.70}/templates/common.yaml (100%) rename dependency/mariadb/{1.0.69 => 1.0.70}/templates/secret.yaml (100%) rename dependency/mariadb/{1.0.69 => 1.0.70}/values.yaml (100%) rename dependency/memcached/{1.0.69 => 1.0.70}/CHANGELOG.md (91%) rename dependency/memcached/{1.0.69 => 1.0.70}/CONFIG.md (100%) rename dependency/memcached/{1.0.69 => 1.0.70}/Chart.lock (78%) rename dependency/memcached/{1.0.69 => 1.0.70}/Chart.yaml (97%) rename dependency/memcached/{1.0.69 => 1.0.70}/README.md (100%) rename dependency/memcached/{1.0.69 => 1.0.70}/app-readme.md (100%) rename dependency/memcached/{1.0.69 => 1.0.70}/charts/common-8.15.2.tgz (100%) rename dependency/memcached/{1.0.69 => 1.0.70}/helm-values.md (89%) rename dependency/memcached/{1.0.69 => 1.0.70}/ix_values.yaml (65%) rename dependency/memcached/{1.0.69 => 1.0.70}/questions.yaml (100%) rename dependency/memcached/{1.0.69 => 1.0.70}/security.md (99%) rename dependency/memcached/{1.0.69 => 1.0.70}/templates/common.yaml (100%) rename dependency/memcached/{1.0.69 => 1.0.70}/values.yaml (100%) rename dependency/redis/{1.0.72 => 1.0.73}/CHANGELOG.md (91%) rename dependency/redis/{1.0.72 => 1.0.73}/CONFIG.md (100%) rename dependency/redis/{1.0.72 => 1.0.73}/Chart.lock (78%) rename dependency/redis/{1.0.72 => 1.0.73}/Chart.yaml (97%) rename dependency/redis/{1.0.72 => 1.0.73}/README.md (100%) rename dependency/redis/{1.0.72 => 1.0.73}/app-readme.md (100%) rename dependency/redis/{1.0.72 => 1.0.73}/charts/common-8.15.2.tgz (100%) rename dependency/redis/{1.0.72 => 1.0.73}/helm-values.md (97%) rename dependency/redis/{1.0.72 => 1.0.73}/ix_values.yaml (97%) rename dependency/redis/{1.0.72 => 1.0.73}/questions.yaml (100%) rename dependency/redis/{1.0.72 => 1.0.73}/security.md (99%) rename dependency/redis/{1.0.72 => 1.0.73}/templates/common.yaml (100%) rename dependency/redis/{1.0.72 => 1.0.73}/templates/health-configmap.yaml (100%) rename dependency/redis/{1.0.72 => 1.0.73}/templates/secret.yaml (100%) rename dependency/redis/{1.0.72 => 1.0.73}/values.yaml (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/CHANGELOG.md (88%) rename games/minecraft-java/{0.0.7 => 0.0.8}/CONFIG.md (100%) create mode 100644 games/minecraft-java/0.0.8/Chart.lock rename games/minecraft-java/{0.0.7 => 0.0.8}/Chart.yaml (98%) rename games/minecraft-java/{0.0.7 => 0.0.8}/README.md (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/app-readme.md (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/charts/common-8.15.2.tgz (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/ci/base-values.yaml (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/ci/j11-values.yaml (54%) rename games/minecraft-java/{0.0.7 => 0.0.8}/ci/j11j9-values.yaml (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/ci/j8-values.yaml (56%) rename games/minecraft-java/{0.0.7 => 0.0.8}/ci/j8j9-values.yaml (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/helm-values.md (89%) rename games/minecraft-java/{0.0.7 => 0.0.8}/ix_values.yaml (83%) rename games/minecraft-java/{0.0.7 => 0.0.8}/questions.yaml (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/security.md (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/templates/common.yaml (100%) rename games/minecraft-java/{0.0.7 => 0.0.8}/values.yaml (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/CHANGELOG.md (91%) rename stable/anonaddy/{6.0.35 => 6.0.36}/CONFIG.md (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/Chart.lock (87%) rename stable/anonaddy/{6.0.35 => 6.0.36}/Chart.yaml (95%) rename stable/anonaddy/{6.0.35 => 6.0.36}/README.md (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/app-readme.md (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/charts/common-8.15.2.tgz (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/charts/mariadb-1.0.68.tgz (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/charts/redis-1.0.71.tgz (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/helm-values.md (96%) rename stable/anonaddy/{6.0.35 => 6.0.36}/ix_values.yaml (95%) rename stable/anonaddy/{6.0.35 => 6.0.36}/questions.yaml (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/security.md (99%) rename stable/anonaddy/{6.0.35 => 6.0.36}/templates/_appkey.tpl (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/templates/common.yaml (100%) rename stable/anonaddy/{6.0.35 => 6.0.36}/values.yaml (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/CHANGELOG.md (91%) rename stable/babybuddy/{5.0.40 => 5.0.41}/CONFIG.md (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/Chart.lock (84%) rename stable/babybuddy/{5.0.40 => 5.0.41}/Chart.yaml (98%) rename stable/babybuddy/{5.0.40 => 5.0.41}/README.md (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/app-readme.md (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/charts/common-8.15.2.tgz (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/charts/postgresql-6.0.66.tgz (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/helm-values.md (95%) rename stable/babybuddy/{5.0.40 => 5.0.41}/ix_values.yaml (92%) rename stable/babybuddy/{5.0.40 => 5.0.41}/questions.yaml (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/security.md (98%) rename stable/babybuddy/{5.0.40 => 5.0.41}/templates/common.yaml (100%) rename stable/babybuddy/{5.0.40 => 5.0.41}/values.yaml (100%) delete mode 100644 stable/beets/2.0.43/Chart.lock rename stable/beets/{2.0.43 => 2.0.44}/CHANGELOG.md (89%) rename stable/beets/{2.0.43 => 2.0.44}/CONFIG.md (100%) create mode 100644 stable/beets/2.0.44/Chart.lock rename stable/beets/{2.0.43 => 2.0.44}/Chart.yaml (97%) rename stable/beets/{2.0.43 => 2.0.44}/README.md (100%) rename stable/beets/{2.0.43 => 2.0.44}/app-readme.md (100%) rename stable/beets/{2.0.43 => 2.0.44}/charts/common-8.15.2.tgz (100%) rename stable/beets/{2.0.43 => 2.0.44}/helm-values.md (92%) rename stable/beets/{2.0.43 => 2.0.44}/ix_values.yaml (82%) rename stable/beets/{2.0.43 => 2.0.44}/questions.yaml (100%) rename stable/beets/{2.0.43 => 2.0.44}/security.md (99%) rename stable/beets/{2.0.43 => 2.0.44}/templates/common.yaml (100%) rename stable/beets/{2.0.43 => 2.0.44}/values.yaml (100%) delete mode 100644 stable/booksonic-air/4.0.43/Chart.lock rename stable/booksonic-air/{4.0.43 => 4.0.44}/CHANGELOG.md (91%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/CONFIG.md (100%) create mode 100644 stable/booksonic-air/4.0.44/Chart.lock rename stable/booksonic-air/{4.0.43 => 4.0.44}/Chart.yaml (97%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/README.md (100%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/app-readme.md (100%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/charts/common-8.15.2.tgz (100%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/helm-values.md (92%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/ix_values.yaml (91%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/questions.yaml (100%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/security.md (98%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/templates/common.yaml (100%) rename stable/booksonic-air/{4.0.43 => 4.0.44}/values.yaml (100%) delete mode 100644 stable/clamav/1.0.8/Chart.lock rename stable/clamav/{1.0.8 => 1.0.9}/CHANGELOG.md (91%) rename stable/clamav/{1.0.8 => 1.0.9}/CONFIG.md (100%) create mode 100644 stable/clamav/1.0.9/Chart.lock rename stable/clamav/{1.0.8 => 1.0.9}/Chart.yaml (98%) rename stable/clamav/{1.0.8 => 1.0.9}/README.md (100%) rename stable/clamav/{1.0.8 => 1.0.9}/app-readme.md (100%) rename stable/clamav/{1.0.8 => 1.0.9}/charts/common-8.15.2.tgz (100%) rename stable/clamav/{1.0.8 => 1.0.9}/helm-values.md (96%) rename stable/clamav/{1.0.8 => 1.0.9}/ix_values.yaml (93%) rename stable/clamav/{1.0.8 => 1.0.9}/questions.yaml (100%) rename stable/clamav/{1.0.8 => 1.0.9}/security.md (99%) rename stable/clamav/{1.0.8 => 1.0.9}/templates/common.yaml (100%) rename stable/clamav/{1.0.8 => 1.0.9}/values.yaml (100%) delete mode 100644 stable/code-server/2.1.24/Chart.lock rename stable/code-server/{2.1.24 => 2.1.25}/CHANGELOG.md (91%) rename stable/code-server/{2.1.24 => 2.1.25}/CONFIG.md (100%) create mode 100644 stable/code-server/2.1.25/Chart.lock rename stable/code-server/{2.1.24 => 2.1.25}/Chart.yaml (97%) rename stable/code-server/{2.1.24 => 2.1.25}/README.md (100%) rename stable/code-server/{2.1.24 => 2.1.25}/app-readme.md (100%) rename stable/code-server/{2.1.24 => 2.1.25}/charts/common-8.15.2.tgz (100%) rename stable/code-server/{2.1.24 => 2.1.25}/helm-values.md (92%) rename stable/code-server/{2.1.24 => 2.1.25}/ix_values.yaml (83%) rename stable/code-server/{2.1.24 => 2.1.25}/questions.yaml (100%) rename stable/code-server/{2.1.24 => 2.1.25}/security.md (96%) rename stable/code-server/{2.1.24 => 2.1.25}/templates/common.yaml (100%) rename stable/code-server/{2.1.24 => 2.1.25}/values.yaml (100%) delete mode 100644 stable/filezilla/2.0.39/Chart.lock rename stable/filezilla/{2.0.39 => 2.0.41}/CHANGELOG.md (91%) rename stable/filezilla/{2.0.39 => 2.0.41}/CONFIG.md (100%) create mode 100644 stable/filezilla/2.0.41/Chart.lock rename stable/filezilla/{2.0.39 => 2.0.41}/Chart.yaml (94%) rename stable/filezilla/{2.0.39 => 2.0.41}/README.md (100%) rename stable/filezilla/{2.0.39 => 2.0.41}/app-readme.md (100%) rename stable/filezilla/{2.0.39 => 2.0.41}/charts/common-8.15.2.tgz (100%) rename stable/filezilla/{2.0.39 => 2.0.41}/helm-values.md (91%) rename stable/filezilla/{2.0.39 => 2.0.41}/ix_values.yaml (80%) rename stable/filezilla/{2.0.39 => 2.0.41}/questions.yaml (100%) rename stable/filezilla/{2.0.39 => 2.0.41}/security.md (90%) rename stable/filezilla/{2.0.39 => 2.0.41}/templates/common.yaml (100%) rename stable/filezilla/{2.0.39 => 2.0.41}/values.yaml (100%) delete mode 100644 stable/grafana/2.0.40/Chart.lock rename stable/grafana/{2.0.40 => 2.0.41}/CHANGELOG.md (91%) rename stable/grafana/{2.0.40 => 2.0.41}/CONFIG.md (100%) rename {dependency/mariadb/1.0.69 => stable/grafana/2.0.41}/Chart.lock (79%) rename stable/grafana/{2.0.40 => 2.0.41}/Chart.yaml (98%) rename stable/grafana/{2.0.40 => 2.0.41}/README.md (100%) rename stable/grafana/{2.0.40 => 2.0.41}/app-readme.md (100%) rename stable/grafana/{2.0.40 => 2.0.41}/charts/common-8.15.2.tgz (100%) rename stable/grafana/{2.0.40 => 2.0.41}/helm-values.md (95%) rename stable/grafana/{2.0.40 => 2.0.41}/ix_values.yaml (95%) rename stable/grafana/{2.0.40 => 2.0.41}/questions.yaml (100%) rename stable/grafana/{2.0.40 => 2.0.41}/security.md (97%) rename stable/grafana/{2.0.40 => 2.0.41}/templates/common.yaml (100%) rename stable/grafana/{2.0.40 => 2.0.41}/templates/prometheusrules.yaml (100%) rename stable/grafana/{2.0.40 => 2.0.41}/templates/servicemonitor.yaml (100%) rename stable/grafana/{2.0.40 => 2.0.41}/values.yaml (100%) delete mode 100644 stable/grocy/9.0.44/Chart.lock rename stable/grocy/{9.0.44 => 9.0.45}/CHANGELOG.md (91%) rename stable/grocy/{9.0.44 => 9.0.45}/CONFIG.md (100%) create mode 100644 stable/grocy/9.0.45/Chart.lock rename stable/grocy/{9.0.44 => 9.0.45}/Chart.yaml (97%) rename stable/grocy/{9.0.44 => 9.0.45}/README.md (100%) rename stable/grocy/{9.0.44 => 9.0.45}/app-readme.md (100%) rename stable/grocy/{9.0.44 => 9.0.45}/charts/common-8.15.2.tgz (100%) rename stable/grocy/{9.0.44 => 9.0.45}/helm-values.md (92%) rename stable/grocy/{9.0.44 => 9.0.45}/ix_values.yaml (81%) rename stable/grocy/{9.0.44 => 9.0.45}/questions.yaml (100%) rename stable/grocy/{9.0.44 => 9.0.45}/security.md (99%) rename stable/grocy/{9.0.44 => 9.0.45}/templates/common.yaml (100%) rename stable/grocy/{9.0.44 => 9.0.45}/values.yaml (100%) delete mode 100644 stable/lazylibrarian/9.0.55/Chart.lock rename stable/lazylibrarian/{9.0.55 => 9.0.56}/CHANGELOG.md (91%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/CONFIG.md (100%) create mode 100644 stable/lazylibrarian/9.0.56/Chart.lock rename stable/lazylibrarian/{9.0.55 => 9.0.56}/Chart.yaml (97%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/README.md (100%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/app-readme.md (100%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/charts/common-8.15.2.tgz (100%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/helm-values.md (92%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/ix_values.yaml (81%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/questions.yaml (100%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/security.md (99%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/templates/common.yaml (100%) rename stable/lazylibrarian/{9.0.55 => 9.0.56}/values.yaml (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/CHANGELOG.md (71%) rename stable/librephotos/{1.0.0 => 1.0.1}/CONFIG.md (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/Chart.lock (87%) rename stable/librephotos/{1.0.0 => 1.0.1}/Chart.yaml (96%) rename stable/librephotos/{1.0.0 => 1.0.1}/README.md (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/app-readme.md (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/charts/common-8.15.2.tgz (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/charts/postgresql-6.0.66.tgz (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/charts/redis-1.0.71.tgz (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/helm-values.md (93%) rename stable/librephotos/{1.0.0 => 1.0.1}/ix_values.yaml (89%) rename stable/librephotos/{1.0.0 => 1.0.1}/questions.yaml (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/security.md (99%) rename stable/librephotos/{1.0.0 => 1.0.1}/templates/_secrets.tpl (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/templates/common.yaml (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/templates/configmap.yaml (100%) rename stable/librephotos/{1.0.0 => 1.0.1}/values.yaml (100%) delete mode 100644 stable/littlelink/4.0.60/Chart.lock rename stable/littlelink/{4.0.60 => 4.0.61}/CHANGELOG.md (91%) rename stable/littlelink/{4.0.60 => 4.0.61}/CONFIG.md (100%) create mode 100644 stable/littlelink/4.0.61/Chart.lock rename stable/littlelink/{4.0.60 => 4.0.61}/Chart.yaml (97%) rename stable/littlelink/{4.0.60 => 4.0.61}/README.md (100%) rename stable/littlelink/{4.0.60 => 4.0.61}/app-readme.md (100%) rename stable/littlelink/{4.0.60 => 4.0.61}/charts/common-8.15.2.tgz (100%) rename stable/littlelink/{4.0.60 => 4.0.61}/helm-values.md (95%) rename stable/littlelink/{4.0.60 => 4.0.61}/ix_values.yaml (93%) rename stable/littlelink/{4.0.60 => 4.0.61}/questions.yaml (100%) rename stable/littlelink/{4.0.60 => 4.0.61}/security.md (99%) rename stable/littlelink/{4.0.60 => 4.0.61}/templates/_configmap.tpl (100%) rename stable/littlelink/{4.0.60 => 4.0.61}/templates/common.yaml (100%) rename stable/littlelink/{4.0.60 => 4.0.61}/values.yaml (100%) delete mode 100644 stable/ombi/9.0.47/Chart.lock rename stable/ombi/{9.0.47 => 9.0.48}/CHANGELOG.md (91%) rename stable/ombi/{9.0.47 => 9.0.48}/CONFIG.md (100%) create mode 100644 stable/ombi/9.0.48/Chart.lock rename stable/ombi/{9.0.47 => 9.0.48}/Chart.yaml (94%) rename stable/ombi/{9.0.47 => 9.0.48}/README.md (100%) rename stable/ombi/{9.0.47 => 9.0.48}/app-readme.md (100%) rename stable/ombi/{9.0.47 => 9.0.48}/charts/common-8.15.2.tgz (100%) rename stable/ombi/{9.0.47 => 9.0.48}/helm-values.md (92%) rename stable/ombi/{9.0.47 => 9.0.48}/ix_values.yaml (87%) rename stable/ombi/{9.0.47 => 9.0.48}/questions.yaml (100%) rename stable/ombi/{9.0.47 => 9.0.48}/security.md (95%) rename stable/ombi/{9.0.47 => 9.0.48}/templates/common.yaml (100%) rename stable/ombi/{9.0.47 => 9.0.48}/values.yaml (100%) delete mode 100644 stable/piaware/4.0.54/Chart.lock rename stable/piaware/{4.0.54 => 4.0.55}/CHANGELOG.md (92%) rename stable/piaware/{4.0.54 => 4.0.55}/CONFIG.md (100%) create mode 100644 stable/piaware/4.0.55/Chart.lock rename stable/piaware/{4.0.54 => 4.0.55}/Chart.yaml (97%) rename stable/piaware/{4.0.54 => 4.0.55}/README.md (100%) rename stable/piaware/{4.0.54 => 4.0.55}/app-readme.md (100%) rename stable/piaware/{4.0.54 => 4.0.55}/charts/common-8.15.2.tgz (100%) rename stable/piaware/{4.0.54 => 4.0.55}/ci/ct-values.yaml (100%) rename stable/piaware/{4.0.54 => 4.0.55}/helm-values.md (93%) rename stable/piaware/{4.0.54 => 4.0.55}/ix_values.yaml (93%) rename stable/piaware/{4.0.54 => 4.0.55}/questions.yaml (100%) rename stable/piaware/{4.0.54 => 4.0.55}/security.md (98%) rename stable/piaware/{4.0.54 => 4.0.55}/templates/common.yaml (100%) rename stable/piaware/{4.0.54 => 4.0.55}/values.yaml (100%) diff --git a/core/prometheus/1.1.62/CHANGELOG.md b/core/prometheus/1.1.63/CHANGELOG.md similarity index 91% rename from core/prometheus/1.1.62/CHANGELOG.md rename to core/prometheus/1.1.63/CHANGELOG.md index 8a0d2de305a..94e88338e7d 100644 --- a/core/prometheus/1.1.62/CHANGELOG.md +++ b/core/prometheus/1.1.63/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prometheus-1.1.63](https://github.com/truecharts/apps/compare/prometheus-1.1.62...prometheus-1.1.63) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [prometheus-1.1.62](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-2.0.20...prometheus-1.1.62) (2022-02-10) @@ -88,12 +97,3 @@ ### [prometheus-1.1.53](https://github.com/truecharts/apps/compare/prometheus-1.1.52...prometheus-1.1.53) (2022-01-25) #### Chore - -* update helm general non-major helm releases ([#1791](https://github.com/truecharts/apps/issues/1791)) - - - - -### [prometheus-1.1.52](https://github.com/truecharts/apps/compare/prometheus-1.1.51...prometheus-1.1.52) (2022-01-24) - -#### Chore diff --git a/core/prometheus/1.1.62/CONFIG.md b/core/prometheus/1.1.63/CONFIG.md similarity index 100% rename from core/prometheus/1.1.62/CONFIG.md rename to core/prometheus/1.1.63/CONFIG.md diff --git a/core/prometheus/1.1.62/Chart.lock b/core/prometheus/1.1.63/Chart.lock similarity index 88% rename from core/prometheus/1.1.62/Chart.lock rename to core/prometheus/1.1.63/Chart.lock index 871e24bce31..34daa6bd2ec 100644 --- a/core/prometheus/1.1.62/Chart.lock +++ b/core/prometheus/1.1.63/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://charts.bitnami.com/bitnami version: 2.2.4 digest: sha256:9b6ea8fe356714a94633c43c67fc78e9bf74c465c1d6ea50f7786b646b01436d -generated: "2022-02-10T16:17:27.639108963Z" +generated: "2022-02-14T11:42:48.594071333Z" diff --git a/core/prometheus/1.1.62/Chart.yaml b/core/prometheus/1.1.63/Chart.yaml similarity index 98% rename from core/prometheus/1.1.62/Chart.yaml rename to core/prometheus/1.1.63/Chart.yaml index d2c10981741..3c49b6ebb45 100644 --- a/core/prometheus/1.1.62/Chart.yaml +++ b/core/prometheus/1.1.63/Chart.yaml @@ -28,7 +28,7 @@ sources: - https://github.com/prometheus-community/helm-charts - https://github.com/prometheus-operator/kube-prometheus type: application -version: 1.1.62 +version: 1.1.63 annotations: truecharts.org/catagories: | - metrics diff --git a/core/prometheus/1.1.62/README.md b/core/prometheus/1.1.63/README.md similarity index 100% rename from core/prometheus/1.1.62/README.md rename to core/prometheus/1.1.63/README.md diff --git a/core/prometheus/1.1.62/app-readme.md b/core/prometheus/1.1.63/app-readme.md similarity index 100% rename from core/prometheus/1.1.62/app-readme.md rename to core/prometheus/1.1.63/app-readme.md diff --git a/core/prometheus/1.1.62/charts/common-8.15.2.tgz b/core/prometheus/1.1.63/charts/common-8.15.2.tgz similarity index 100% rename from core/prometheus/1.1.62/charts/common-8.15.2.tgz rename to core/prometheus/1.1.63/charts/common-8.15.2.tgz diff --git a/core/prometheus/1.1.62/charts/kube-state-metrics-2.2.4.tgz b/core/prometheus/1.1.63/charts/kube-state-metrics-2.2.4.tgz similarity index 100% rename from core/prometheus/1.1.62/charts/kube-state-metrics-2.2.4.tgz rename to core/prometheus/1.1.63/charts/kube-state-metrics-2.2.4.tgz diff --git a/core/prometheus/1.1.62/charts/node-exporter-2.4.1.tgz b/core/prometheus/1.1.63/charts/node-exporter-2.4.1.tgz similarity index 100% rename from core/prometheus/1.1.62/charts/node-exporter-2.4.1.tgz rename to core/prometheus/1.1.63/charts/node-exporter-2.4.1.tgz diff --git a/core/prometheus/1.1.62/crds/crd-alertmanager-config.yaml b/core/prometheus/1.1.63/crds/crd-alertmanager-config.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-alertmanager-config.yaml rename to core/prometheus/1.1.63/crds/crd-alertmanager-config.yaml diff --git a/core/prometheus/1.1.62/crds/crd-alertmanager.yaml b/core/prometheus/1.1.63/crds/crd-alertmanager.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-alertmanager.yaml rename to core/prometheus/1.1.63/crds/crd-alertmanager.yaml diff --git a/core/prometheus/1.1.62/crds/crd-podmonitor.yaml b/core/prometheus/1.1.63/crds/crd-podmonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-podmonitor.yaml rename to core/prometheus/1.1.63/crds/crd-podmonitor.yaml diff --git a/core/prometheus/1.1.62/crds/crd-probes.yaml b/core/prometheus/1.1.63/crds/crd-probes.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-probes.yaml rename to core/prometheus/1.1.63/crds/crd-probes.yaml diff --git a/core/prometheus/1.1.62/crds/crd-prometheus.yaml b/core/prometheus/1.1.63/crds/crd-prometheus.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-prometheus.yaml rename to core/prometheus/1.1.63/crds/crd-prometheus.yaml diff --git a/core/prometheus/1.1.62/crds/crd-prometheusrules.yaml b/core/prometheus/1.1.63/crds/crd-prometheusrules.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-prometheusrules.yaml rename to core/prometheus/1.1.63/crds/crd-prometheusrules.yaml diff --git a/core/prometheus/1.1.62/crds/crd-servicemonitor.yaml b/core/prometheus/1.1.63/crds/crd-servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-servicemonitor.yaml rename to core/prometheus/1.1.63/crds/crd-servicemonitor.yaml diff --git a/core/prometheus/1.1.62/crds/crd-thanosrulers.yaml b/core/prometheus/1.1.63/crds/crd-thanosrulers.yaml similarity index 100% rename from core/prometheus/1.1.62/crds/crd-thanosrulers.yaml rename to core/prometheus/1.1.63/crds/crd-thanosrulers.yaml diff --git a/core/prometheus/1.1.62/helm-values.md b/core/prometheus/1.1.63/helm-values.md similarity index 98% rename from core/prometheus/1.1.62/helm-values.md rename to core/prometheus/1.1.63/helm-values.md index f84880b17f9..18259c42a01 100644 --- a/core/prometheus/1.1.62/helm-values.md +++ b/core/prometheus/1.1.63/helm-values.md @@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here | alertmanager.volumeMounts | list | `[]` | | | alertmanager.volumes | list | `[]` | | | alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | | -| alertmanagerImage.tag | string | `"v0.23.0@sha256:65d3fc362b11bd021e0a3394b03c00266fb563662fe0a6c873b5b05317cf468f"` | | +| alertmanagerImage.tag | string | `"v0.23.0@sha256:fd44862f7c02946d6642b8e65ad9818c6e9327c4b6e30d484bc1867431a8c294"` | | | coreDns.enabled | bool | `true` | | | coreDns.namespace | string | `"kube-system"` | | | coreDns.service.enabled | bool | `true` | | @@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here | prometheus.volumes | list | `[]` | | | prometheus.walCompression | bool | `false` | | | prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | | -| prometheusImage.tag | string | `"v2.33.1@sha256:e269416d8cb5128d33e78dab5a38ab6873098df8eec569d771fa6c64ec3bb438"` | | +| prometheusImage.tag | string | `"v2.33.1@sha256:1c7d1f4f420bffe5efac63f5a63f183eab801c92f5d6cd9c52cf5675d770efc0"` | | | rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created | | securityContext.readOnlyRootFilesystem | bool | `false` | | | service.alertmanager.enabled | bool | `true` | | @@ -346,6 +346,6 @@ You will, however, be able to use all values referenced in the common chart here | service.thanos.selector.prometheus | string | `"{{ template \"kube-prometheus.prometheus.fullname\" . }}"` | | | serviceAccount | object | `{"create":true}` | The service account the pods will use to interact with the Kubernetes API | | thanosImage.repository | string | `"tccr.io/truecharts/thanos"` | | -| thanosImage.tag | string | `"v0.24.0@sha256:b4ec6b3e8fa9bfdb8cd3dc8fac490f2d31f6cfe87479d13063530fd0152e9fdd"` | | +| thanosImage.tag | string | `"v0.24.0@sha256:75a0f75e0bdd55b9ecaf053a25ea6de85f0c618b05fc2d069ea5b51cda214f5f"` | | All Rights Reserved - The TrueCharts Project diff --git a/core/prometheus/1.1.62/ix_values.yaml b/core/prometheus/1.1.63/ix_values.yaml similarity index 99% rename from core/prometheus/1.1.62/ix_values.yaml rename to core/prometheus/1.1.63/ix_values.yaml index a16fd3b80fa..17276368ebb 100644 --- a/core/prometheus/1.1.62/ix_values.yaml +++ b/core/prometheus/1.1.63/ix_values.yaml @@ -4,15 +4,15 @@ image: prometheusImage: repository: tccr.io/truecharts/prometheus - tag: v2.33.1@sha256:e269416d8cb5128d33e78dab5a38ab6873098df8eec569d771fa6c64ec3bb438 + tag: v2.33.1@sha256:1c7d1f4f420bffe5efac63f5a63f183eab801c92f5d6cd9c52cf5675d770efc0 thanosImage: repository: tccr.io/truecharts/thanos - tag: v0.24.0@sha256:b4ec6b3e8fa9bfdb8cd3dc8fac490f2d31f6cfe87479d13063530fd0152e9fdd + tag: v0.24.0@sha256:75a0f75e0bdd55b9ecaf053a25ea6de85f0c618b05fc2d069ea5b51cda214f5f alertmanagerImage: repository: tccr.io/truecharts/alertmanager - tag: v0.23.0@sha256:65d3fc362b11bd021e0a3394b03c00266fb563662fe0a6c873b5b05317cf468f + tag: v0.23.0@sha256:fd44862f7c02946d6642b8e65ad9818c6e9327c4b6e30d484bc1867431a8c294 global: labels: {} diff --git a/core/prometheus/1.1.62/questions.yaml b/core/prometheus/1.1.63/questions.yaml similarity index 100% rename from core/prometheus/1.1.62/questions.yaml rename to core/prometheus/1.1.63/questions.yaml diff --git a/core/prometheus/1.1.62/security.md b/core/prometheus/1.1.63/security.md similarity index 100% rename from core/prometheus/1.1.62/security.md rename to core/prometheus/1.1.63/security.md diff --git a/core/prometheus/1.1.62/templates/_helpers.tpl b/core/prometheus/1.1.63/templates/_helpers.tpl similarity index 100% rename from core/prometheus/1.1.62/templates/_helpers.tpl rename to core/prometheus/1.1.63/templates/_helpers.tpl diff --git a/core/prometheus/1.1.62/templates/alertmanager/_alertmanager.tpl b/core/prometheus/1.1.63/templates/alertmanager/_alertmanager.tpl similarity index 100% rename from core/prometheus/1.1.62/templates/alertmanager/_alertmanager.tpl rename to core/prometheus/1.1.63/templates/alertmanager/_alertmanager.tpl diff --git a/core/prometheus/1.1.62/templates/alertmanager/secrets.yaml b/core/prometheus/1.1.63/templates/alertmanager/secrets.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/alertmanager/secrets.yaml rename to core/prometheus/1.1.63/templates/alertmanager/secrets.yaml diff --git a/core/prometheus/1.1.62/templates/alertmanager/serviceaccount.yaml b/core/prometheus/1.1.63/templates/alertmanager/serviceaccount.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/alertmanager/serviceaccount.yaml rename to core/prometheus/1.1.63/templates/alertmanager/serviceaccount.yaml diff --git a/core/prometheus/1.1.62/templates/alertmanager/servicemonitor.yaml b/core/prometheus/1.1.63/templates/alertmanager/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/alertmanager/servicemonitor.yaml rename to core/prometheus/1.1.63/templates/alertmanager/servicemonitor.yaml diff --git a/core/prometheus/1.1.62/templates/common.yaml b/core/prometheus/1.1.63/templates/common.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/common.yaml rename to core/prometheus/1.1.63/templates/common.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/core-dns/service.yaml b/core/prometheus/1.1.63/templates/exporters/core-dns/service.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/core-dns/service.yaml rename to core/prometheus/1.1.63/templates/exporters/core-dns/service.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/core-dns/servicemonitor.yaml b/core/prometheus/1.1.63/templates/exporters/core-dns/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/core-dns/servicemonitor.yaml rename to core/prometheus/1.1.63/templates/exporters/core-dns/servicemonitor.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kube-apiserver/servicemonitor.yaml b/core/prometheus/1.1.63/templates/exporters/kube-apiserver/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kube-apiserver/servicemonitor.yaml rename to core/prometheus/1.1.63/templates/exporters/kube-apiserver/servicemonitor.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kube-controller-manager/endpoints.yaml b/core/prometheus/1.1.63/templates/exporters/kube-controller-manager/endpoints.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kube-controller-manager/endpoints.yaml rename to core/prometheus/1.1.63/templates/exporters/kube-controller-manager/endpoints.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kube-controller-manager/service.yaml b/core/prometheus/1.1.63/templates/exporters/kube-controller-manager/service.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kube-controller-manager/service.yaml rename to core/prometheus/1.1.63/templates/exporters/kube-controller-manager/service.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kube-controller-manager/servicemonitor.yaml b/core/prometheus/1.1.63/templates/exporters/kube-controller-manager/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kube-controller-manager/servicemonitor.yaml rename to core/prometheus/1.1.63/templates/exporters/kube-controller-manager/servicemonitor.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kube-scheduler/endpoints.yaml b/core/prometheus/1.1.63/templates/exporters/kube-scheduler/endpoints.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kube-scheduler/endpoints.yaml rename to core/prometheus/1.1.63/templates/exporters/kube-scheduler/endpoints.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kube-scheduler/service.yaml b/core/prometheus/1.1.63/templates/exporters/kube-scheduler/service.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kube-scheduler/service.yaml rename to core/prometheus/1.1.63/templates/exporters/kube-scheduler/service.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kube-scheduler/servicemonitor.yaml b/core/prometheus/1.1.63/templates/exporters/kube-scheduler/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kube-scheduler/servicemonitor.yaml rename to core/prometheus/1.1.63/templates/exporters/kube-scheduler/servicemonitor.yaml diff --git a/core/prometheus/1.1.62/templates/exporters/kubelet/servicemonitor.yaml b/core/prometheus/1.1.63/templates/exporters/kubelet/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/exporters/kubelet/servicemonitor.yaml rename to core/prometheus/1.1.63/templates/exporters/kubelet/servicemonitor.yaml diff --git a/core/prometheus/1.1.62/templates/operator/_args.tpl b/core/prometheus/1.1.63/templates/operator/_args.tpl similarity index 100% rename from core/prometheus/1.1.62/templates/operator/_args.tpl rename to core/prometheus/1.1.63/templates/operator/_args.tpl diff --git a/core/prometheus/1.1.62/templates/operator/configmap.yaml b/core/prometheus/1.1.63/templates/operator/configmap.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/operator/configmap.yaml rename to core/prometheus/1.1.63/templates/operator/configmap.yaml diff --git a/core/prometheus/1.1.62/templates/operator/servicemonitor.yaml b/core/prometheus/1.1.63/templates/operator/servicemonitor.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/operator/servicemonitor.yaml rename to core/prometheus/1.1.63/templates/operator/servicemonitor.yaml diff --git a/core/prometheus/1.1.62/templates/prometheus/_additionalPrometheusRules.tpl b/core/prometheus/1.1.63/templates/prometheus/_additionalPrometheusRules.tpl similarity index 100% rename from core/prometheus/1.1.62/templates/prometheus/_additionalPrometheusRules.tpl rename to core/prometheus/1.1.63/templates/prometheus/_additionalPrometheusRules.tpl diff --git a/core/prometheus/1.1.62/templates/prometheus/_additionalScrapeJobs.tpl b/core/prometheus/1.1.63/templates/prometheus/_additionalScrapeJobs.tpl similarity index 100% rename from core/prometheus/1.1.62/templates/prometheus/_additionalScrapeJobs.tpl rename to core/prometheus/1.1.63/templates/prometheus/_additionalScrapeJobs.tpl diff --git a/core/prometheus/1.1.62/templates/prometheus/_prometheus.tpl b/core/prometheus/1.1.63/templates/prometheus/_prometheus.tpl similarity index 100% rename from core/prometheus/1.1.62/templates/prometheus/_prometheus.tpl rename to core/prometheus/1.1.63/templates/prometheus/_prometheus.tpl diff --git a/core/prometheus/1.1.62/templates/prometheus/_servicemonitor.tpl b/core/prometheus/1.1.63/templates/prometheus/_servicemonitor.tpl similarity index 100% rename from core/prometheus/1.1.62/templates/prometheus/_servicemonitor.tpl rename to core/prometheus/1.1.63/templates/prometheus/_servicemonitor.tpl diff --git a/core/prometheus/1.1.62/templates/prometheus/clusterrole.yaml b/core/prometheus/1.1.63/templates/prometheus/clusterrole.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/prometheus/clusterrole.yaml rename to core/prometheus/1.1.63/templates/prometheus/clusterrole.yaml diff --git a/core/prometheus/1.1.62/templates/prometheus/clusterrolebinding.yaml b/core/prometheus/1.1.63/templates/prometheus/clusterrolebinding.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/prometheus/clusterrolebinding.yaml rename to core/prometheus/1.1.63/templates/prometheus/clusterrolebinding.yaml diff --git a/core/prometheus/1.1.62/templates/prometheus/serviceaccount.yaml b/core/prometheus/1.1.63/templates/prometheus/serviceaccount.yaml similarity index 100% rename from core/prometheus/1.1.62/templates/prometheus/serviceaccount.yaml rename to core/prometheus/1.1.63/templates/prometheus/serviceaccount.yaml diff --git a/core/prometheus/1.1.62/values.yaml b/core/prometheus/1.1.63/values.yaml similarity index 100% rename from core/prometheus/1.1.62/values.yaml rename to core/prometheus/1.1.63/values.yaml diff --git a/dependency/mariadb/1.0.69/CHANGELOG.md b/dependency/mariadb/1.0.70/CHANGELOG.md similarity index 91% rename from dependency/mariadb/1.0.69/CHANGELOG.md rename to dependency/mariadb/1.0.70/CHANGELOG.md index cc5f69181cd..30c5882eb61 100644 --- a/dependency/mariadb/1.0.69/CHANGELOG.md +++ b/dependency/mariadb/1.0.70/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [mariadb-1.0.70](https://github.com/truecharts/apps/compare/mariadb-1.0.69...mariadb-1.0.70) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [mariadb-1.0.69](https://github.com/truecharts/apps/compare/mariadb-1.0.68...mariadb-1.0.69) (2022-02-10) @@ -88,12 +97,3 @@ ### [mariadb-1.0.60](https://github.com/truecharts/apps/compare/mariadb-1.0.59...mariadb-1.0.60) (2022-01-24) #### Chore - -* update docker general non-major ([#1786](https://github.com/truecharts/apps/issues/1786)) - - - - -### [mariadb-1.0.59](https://github.com/truecharts/apps/compare/mariadb-1.0.58...mariadb-1.0.59) (2022-01-22) - -#### Chore diff --git a/dependency/mariadb/1.0.69/CONFIG.md b/dependency/mariadb/1.0.70/CONFIG.md similarity index 100% rename from dependency/mariadb/1.0.69/CONFIG.md rename to dependency/mariadb/1.0.70/CONFIG.md diff --git a/games/minecraft-java/0.0.7/Chart.lock b/dependency/mariadb/1.0.70/Chart.lock similarity index 78% rename from games/minecraft-java/0.0.7/Chart.lock rename to dependency/mariadb/1.0.70/Chart.lock index db5550bfe86..6243f9dd63d 100644 --- a/games/minecraft-java/0.0.7/Chart.lock +++ b/dependency/mariadb/1.0.70/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.15.2 digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-14T10:11:36.652331864Z" +generated: "2022-02-14T11:42:41.054828724Z" diff --git a/dependency/mariadb/1.0.69/Chart.yaml b/dependency/mariadb/1.0.70/Chart.yaml similarity index 98% rename from dependency/mariadb/1.0.69/Chart.yaml rename to dependency/mariadb/1.0.70/Chart.yaml index beb12148021..9c87d79256e 100644 --- a/dependency/mariadb/1.0.69/Chart.yaml +++ b/dependency/mariadb/1.0.70/Chart.yaml @@ -24,7 +24,7 @@ sources: - https://github.com/prometheus/mysqld_exporter - https://mariadb.org type: application -version: 1.0.69 +version: 1.0.70 annotations: truecharts.org/catagories: | - database diff --git a/dependency/mariadb/1.0.69/README.md b/dependency/mariadb/1.0.70/README.md similarity index 100% rename from dependency/mariadb/1.0.69/README.md rename to dependency/mariadb/1.0.70/README.md diff --git a/dependency/mariadb/1.0.69/app-readme.md b/dependency/mariadb/1.0.70/app-readme.md similarity index 100% rename from dependency/mariadb/1.0.69/app-readme.md rename to dependency/mariadb/1.0.70/app-readme.md diff --git a/dependency/mariadb/1.0.69/charts/common-8.15.2.tgz b/dependency/mariadb/1.0.70/charts/common-8.15.2.tgz similarity index 100% rename from dependency/mariadb/1.0.69/charts/common-8.15.2.tgz rename to dependency/mariadb/1.0.70/charts/common-8.15.2.tgz diff --git a/dependency/mariadb/1.0.69/helm-values.md b/dependency/mariadb/1.0.70/helm-values.md similarity index 97% rename from dependency/mariadb/1.0.69/helm-values.md rename to dependency/mariadb/1.0.70/helm-values.md index 966298eaf4a..bb199b31cb4 100644 --- a/dependency/mariadb/1.0.69/helm-values.md +++ b/dependency/mariadb/1.0.70/helm-values.md @@ -27,7 +27,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/mariadb"` | | -| image.tag | string | `"v10.6.5@sha256:cbee1c585b6ed0c7577cc25cd523d99f44ea5679af1c92f8a9d6334832513a6f"` | | +| image.tag | string | `"v10.6.5@sha256:a2a1df3e6d6c928c460fc8ab5ca2e005098768465213cdc0d598a4098251e81c"` | | | mariadbDatabase | string | `"test"` | | | mariadbPassword | string | `"testpass"` | | | mariadbRootPassword | string | `"testroot"` | | diff --git a/dependency/mariadb/1.0.69/ix_values.yaml b/dependency/mariadb/1.0.70/ix_values.yaml similarity index 97% rename from dependency/mariadb/1.0.69/ix_values.yaml rename to dependency/mariadb/1.0.70/ix_values.yaml index b7effab3ece..12a9ac0999d 100644 --- a/dependency/mariadb/1.0.69/ix_values.yaml +++ b/dependency/mariadb/1.0.70/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/mariadb pullPolicy: IfNotPresent - tag: v10.6.5@sha256:cbee1c585b6ed0c7577cc25cd523d99f44ea5679af1c92f8a9d6334832513a6f + tag: v10.6.5@sha256:a2a1df3e6d6c928c460fc8ab5ca2e005098768465213cdc0d598a4098251e81c controller: # -- Set the controller type. diff --git a/dependency/mariadb/1.0.69/questions.yaml b/dependency/mariadb/1.0.70/questions.yaml similarity index 100% rename from dependency/mariadb/1.0.69/questions.yaml rename to dependency/mariadb/1.0.70/questions.yaml diff --git a/dependency/mariadb/1.0.69/security.md b/dependency/mariadb/1.0.70/security.md similarity index 99% rename from dependency/mariadb/1.0.69/security.md rename to dependency/mariadb/1.0.70/security.md index 171df5c0900..c7f2410e595 100644 --- a/dependency/mariadb/1.0.69/security.md +++ b/dependency/mariadb/1.0.70/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/mariadb:v10.6.5@sha256:cbee1c585b6ed0c7577cc25cd523d99f44ea5679af1c92f8a9d6334832513a6f + tccr.io/truecharts/mariadb:v10.6.5@sha256:a2a1df3e6d6c928c460fc8ab5ca2e005098768465213cdc0d598a4098251e81c ##### Scan Results @@ -113,7 +113,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/mariadb:v10.6.5@sha256:cbee1c585b6ed0c7577cc25cd523d99f44ea5679af1c92f8a9d6334832513a6f (debian 10.11) +#### Container: tccr.io/truecharts/mariadb:v10.6.5@sha256:a2a1df3e6d6c928c460fc8ab5ca2e005098768465213cdc0d598a4098251e81c (debian 10.11) **debian** @@ -281,10 +281,9 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| **gobinary** diff --git a/dependency/mariadb/1.0.69/templates/common.yaml b/dependency/mariadb/1.0.70/templates/common.yaml similarity index 100% rename from dependency/mariadb/1.0.69/templates/common.yaml rename to dependency/mariadb/1.0.70/templates/common.yaml diff --git a/dependency/mariadb/1.0.69/templates/secret.yaml b/dependency/mariadb/1.0.70/templates/secret.yaml similarity index 100% rename from dependency/mariadb/1.0.69/templates/secret.yaml rename to dependency/mariadb/1.0.70/templates/secret.yaml diff --git a/dependency/mariadb/1.0.69/values.yaml b/dependency/mariadb/1.0.70/values.yaml similarity index 100% rename from dependency/mariadb/1.0.69/values.yaml rename to dependency/mariadb/1.0.70/values.yaml diff --git a/dependency/memcached/1.0.69/CHANGELOG.md b/dependency/memcached/1.0.70/CHANGELOG.md similarity index 91% rename from dependency/memcached/1.0.69/CHANGELOG.md rename to dependency/memcached/1.0.70/CHANGELOG.md index 87dd3d9b62d..ba3c74190d0 100644 --- a/dependency/memcached/1.0.69/CHANGELOG.md +++ b/dependency/memcached/1.0.70/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [memcached-1.0.70](https://github.com/truecharts/apps/compare/memcached-1.0.69...memcached-1.0.70) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [memcached-1.0.69](https://github.com/truecharts/apps/compare/memcached-1.0.68...memcached-1.0.69) (2022-02-10) @@ -88,12 +97,3 @@ ### [memcached-1.0.60](https://github.com/truecharts/apps/compare/memcached-1.0.59...memcached-1.0.60) (2022-01-25) #### Chore - -* update helm chart common to v8.14.2 - - - - -### [memcached-1.0.59](https://github.com/truecharts/apps/compare/memcached-1.0.58...memcached-1.0.59) (2022-01-24) - -#### Chore diff --git a/dependency/memcached/1.0.69/CONFIG.md b/dependency/memcached/1.0.70/CONFIG.md similarity index 100% rename from dependency/memcached/1.0.69/CONFIG.md rename to dependency/memcached/1.0.70/CONFIG.md diff --git a/dependency/memcached/1.0.69/Chart.lock b/dependency/memcached/1.0.70/Chart.lock similarity index 78% rename from dependency/memcached/1.0.69/Chart.lock rename to dependency/memcached/1.0.70/Chart.lock index 8a045db4ba5..41bfb611f3b 100644 --- a/dependency/memcached/1.0.69/Chart.lock +++ b/dependency/memcached/1.0.70/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.15.2 digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-10T16:17:20.130852753Z" +generated: "2022-02-14T11:42:41.250685829Z" diff --git a/dependency/memcached/1.0.69/Chart.yaml b/dependency/memcached/1.0.70/Chart.yaml similarity index 97% rename from dependency/memcached/1.0.69/Chart.yaml rename to dependency/memcached/1.0.70/Chart.yaml index c42088689bf..42b218f1d3c 100644 --- a/dependency/memcached/1.0.69/Chart.yaml +++ b/dependency/memcached/1.0.70/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/bitnami/bitnami-docker-memcached - http://memcached.org/ type: application -version: 1.0.69 +version: 1.0.70 annotations: truecharts.org/catagories: | - database diff --git a/dependency/memcached/1.0.69/README.md b/dependency/memcached/1.0.70/README.md similarity index 100% rename from dependency/memcached/1.0.69/README.md rename to dependency/memcached/1.0.70/README.md diff --git a/dependency/memcached/1.0.69/app-readme.md b/dependency/memcached/1.0.70/app-readme.md similarity index 100% rename from dependency/memcached/1.0.69/app-readme.md rename to dependency/memcached/1.0.70/app-readme.md diff --git a/dependency/memcached/1.0.69/charts/common-8.15.2.tgz b/dependency/memcached/1.0.70/charts/common-8.15.2.tgz similarity index 100% rename from dependency/memcached/1.0.69/charts/common-8.15.2.tgz rename to dependency/memcached/1.0.70/charts/common-8.15.2.tgz diff --git a/dependency/memcached/1.0.69/helm-values.md b/dependency/memcached/1.0.70/helm-values.md similarity index 89% rename from dependency/memcached/1.0.69/helm-values.md rename to dependency/memcached/1.0.70/helm-values.md index 917e97cfc1c..6494f59eed8 100644 --- a/dependency/memcached/1.0.69/helm-values.md +++ b/dependency/memcached/1.0.70/helm-values.md @@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/memcached"` | | -| image.tag | string | `"v1.6.14@sha256:f97ecb6047bca28637a0ad0e0133ea585b8110a77bf41b128ea4369ac51d5242"` | | +| image.tag | string | `"v1.6.14@sha256:9232f61c790c6476cde029de2f65e79529448a22436e1ab4e469e5b773a72de2"` | | | service.main.ports.main.port | int | `11211` | | | service.main.ports.main.targetPort | int | `11211` | | diff --git a/dependency/memcached/1.0.69/ix_values.yaml b/dependency/memcached/1.0.70/ix_values.yaml similarity index 65% rename from dependency/memcached/1.0.69/ix_values.yaml rename to dependency/memcached/1.0.70/ix_values.yaml index bbe9a591214..972d8bc8705 100644 --- a/dependency/memcached/1.0.69/ix_values.yaml +++ b/dependency/memcached/1.0.70/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/memcached pullPolicy: IfNotPresent - tag: v1.6.14@sha256:f97ecb6047bca28637a0ad0e0133ea585b8110a77bf41b128ea4369ac51d5242 + tag: v1.6.14@sha256:9232f61c790c6476cde029de2f65e79529448a22436e1ab4e469e5b773a72de2 service: main: diff --git a/dependency/memcached/1.0.69/questions.yaml b/dependency/memcached/1.0.70/questions.yaml similarity index 100% rename from dependency/memcached/1.0.69/questions.yaml rename to dependency/memcached/1.0.70/questions.yaml diff --git a/dependency/memcached/1.0.69/security.md b/dependency/memcached/1.0.70/security.md similarity index 99% rename from dependency/memcached/1.0.69/security.md rename to dependency/memcached/1.0.70/security.md index b58a3e44f28..ffa5498b29d 100644 --- a/dependency/memcached/1.0.69/security.md +++ b/dependency/memcached/1.0.70/security.md @@ -43,7 +43,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/memcached:v1.6.14@sha256:f97ecb6047bca28637a0ad0e0133ea585b8110a77bf41b128ea4369ac51d5242 + tccr.io/truecharts/memcached:v1.6.14@sha256:9232f61c790c6476cde029de2f65e79529448a22436e1ab4e469e5b773a72de2 ##### Scan Results @@ -112,7 +112,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/memcached:v1.6.14@sha256:f97ecb6047bca28637a0ad0e0133ea585b8110a77bf41b128ea4369ac51d5242 (debian 10.11) +#### Container: tccr.io/truecharts/memcached:v1.6.14@sha256:9232f61c790c6476cde029de2f65e79529448a22436e1ab4e469e5b773a72de2 (debian 10.11) **debian** @@ -278,8 +278,7 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| diff --git a/dependency/memcached/1.0.69/templates/common.yaml b/dependency/memcached/1.0.70/templates/common.yaml similarity index 100% rename from dependency/memcached/1.0.69/templates/common.yaml rename to dependency/memcached/1.0.70/templates/common.yaml diff --git a/dependency/memcached/1.0.69/values.yaml b/dependency/memcached/1.0.70/values.yaml similarity index 100% rename from dependency/memcached/1.0.69/values.yaml rename to dependency/memcached/1.0.70/values.yaml diff --git a/dependency/redis/1.0.72/CHANGELOG.md b/dependency/redis/1.0.73/CHANGELOG.md similarity index 91% rename from dependency/redis/1.0.72/CHANGELOG.md rename to dependency/redis/1.0.73/CHANGELOG.md index 701960834ca..086039d58f1 100644 --- a/dependency/redis/1.0.72/CHANGELOG.md +++ b/dependency/redis/1.0.73/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [redis-1.0.73](https://github.com/truecharts/apps/compare/redis-1.0.72...redis-1.0.73) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [redis-1.0.72](https://github.com/truecharts/apps/compare/redis-1.0.71...redis-1.0.72) (2022-02-10) @@ -88,12 +97,3 @@ ### [redis-1.0.63](https://github.com/truecharts/apps/compare/redis-1.0.62...redis-1.0.63) (2022-01-25) #### Chore - -* update helm chart common to v8.14.2 - - - - -### [redis-1.0.62](https://github.com/truecharts/apps/compare/redis-1.0.61...redis-1.0.62) (2022-01-24) - -#### Chore diff --git a/dependency/redis/1.0.72/CONFIG.md b/dependency/redis/1.0.73/CONFIG.md similarity index 100% rename from dependency/redis/1.0.72/CONFIG.md rename to dependency/redis/1.0.73/CONFIG.md diff --git a/dependency/redis/1.0.72/Chart.lock b/dependency/redis/1.0.73/Chart.lock similarity index 78% rename from dependency/redis/1.0.72/Chart.lock rename to dependency/redis/1.0.73/Chart.lock index 86371cea4f9..052dcd3da26 100644 --- a/dependency/redis/1.0.72/Chart.lock +++ b/dependency/redis/1.0.73/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.15.2 digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-10T16:17:43.689571386Z" +generated: "2022-02-14T11:42:41.087609259Z" diff --git a/dependency/redis/1.0.72/Chart.yaml b/dependency/redis/1.0.73/Chart.yaml similarity index 97% rename from dependency/redis/1.0.72/Chart.yaml rename to dependency/redis/1.0.73/Chart.yaml index 2022656a54f..3903b2f3528 100644 --- a/dependency/redis/1.0.72/Chart.yaml +++ b/dependency/redis/1.0.73/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/bitnami/bitnami-docker-redis - http://redis.io/ type: application -version: 1.0.72 +version: 1.0.73 annotations: truecharts.org/catagories: | - database diff --git a/dependency/redis/1.0.72/README.md b/dependency/redis/1.0.73/README.md similarity index 100% rename from dependency/redis/1.0.72/README.md rename to dependency/redis/1.0.73/README.md diff --git a/dependency/redis/1.0.72/app-readme.md b/dependency/redis/1.0.73/app-readme.md similarity index 100% rename from dependency/redis/1.0.72/app-readme.md rename to dependency/redis/1.0.73/app-readme.md diff --git a/dependency/redis/1.0.72/charts/common-8.15.2.tgz b/dependency/redis/1.0.73/charts/common-8.15.2.tgz similarity index 100% rename from dependency/redis/1.0.72/charts/common-8.15.2.tgz rename to dependency/redis/1.0.73/charts/common-8.15.2.tgz diff --git a/dependency/redis/1.0.72/helm-values.md b/dependency/redis/1.0.73/helm-values.md similarity index 97% rename from dependency/redis/1.0.72/helm-values.md rename to dependency/redis/1.0.73/helm-values.md index 0d32a4af4f6..dc087fb0ac8 100644 --- a/dependency/redis/1.0.72/helm-values.md +++ b/dependency/redis/1.0.73/helm-values.md @@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/redis"` | | -| image.tag | string | `"v6.2.6@sha256:be5951223ae915e6ae3b6288a3e81ff756ae1a79bc1cdfb21924986ad575ff61"` | | +| image.tag | string | `"v6.2.6@sha256:a1727c5389c03cdef4db37000305898fe7678586471c3fdd325dc24655517887"` | | | persistence.redis-health | object | See below | redis-health configmap mount | | persistence.redis-health.mountPath | string | `"/health"` | Where to mount the volume in the main container. Defaults to `/`, setting to '-' creates the volume but disables the volumeMount. | | persistence.redis-health.readOnly | bool | `false` | Specify if the volume should be mounted read-only. | diff --git a/dependency/redis/1.0.72/ix_values.yaml b/dependency/redis/1.0.73/ix_values.yaml similarity index 97% rename from dependency/redis/1.0.72/ix_values.yaml rename to dependency/redis/1.0.73/ix_values.yaml index 548dfa592aa..d8f28f798c9 100644 --- a/dependency/redis/1.0.72/ix_values.yaml +++ b/dependency/redis/1.0.73/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: ghcr.io/truecharts/redis pullPolicy: IfNotPresent - tag: v6.2.6@sha256:be5951223ae915e6ae3b6288a3e81ff756ae1a79bc1cdfb21924986ad575ff61 + tag: v6.2.6@sha256:a1727c5389c03cdef4db37000305898fe7678586471c3fdd325dc24655517887 controller: # -- Set the controller type. diff --git a/dependency/redis/1.0.72/questions.yaml b/dependency/redis/1.0.73/questions.yaml similarity index 100% rename from dependency/redis/1.0.72/questions.yaml rename to dependency/redis/1.0.73/questions.yaml diff --git a/dependency/redis/1.0.72/security.md b/dependency/redis/1.0.73/security.md similarity index 99% rename from dependency/redis/1.0.72/security.md rename to dependency/redis/1.0.73/security.md index dc9b0f94057..a9d9af26b18 100644 --- a/dependency/redis/1.0.72/security.md +++ b/dependency/redis/1.0.73/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/redis:v6.2.6@sha256:be5951223ae915e6ae3b6288a3e81ff756ae1a79bc1cdfb21924986ad575ff61 + tccr.io/truecharts/redis:v6.2.6@sha256:a1727c5389c03cdef4db37000305898fe7678586471c3fdd325dc24655517887 ##### Scan Results @@ -113,7 +113,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:be5951223ae915e6ae3b6288a3e81ff756ae1a79bc1cdfb21924986ad575ff61 (debian 10.11) +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:a1727c5389c03cdef4db37000305898fe7678586471c3fdd325dc24655517887 (debian 10.11) **debian** @@ -279,10 +279,9 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| **gobinary** diff --git a/dependency/redis/1.0.72/templates/common.yaml b/dependency/redis/1.0.73/templates/common.yaml similarity index 100% rename from dependency/redis/1.0.72/templates/common.yaml rename to dependency/redis/1.0.73/templates/common.yaml diff --git a/dependency/redis/1.0.72/templates/health-configmap.yaml b/dependency/redis/1.0.73/templates/health-configmap.yaml similarity index 100% rename from dependency/redis/1.0.72/templates/health-configmap.yaml rename to dependency/redis/1.0.73/templates/health-configmap.yaml diff --git a/dependency/redis/1.0.72/templates/secret.yaml b/dependency/redis/1.0.73/templates/secret.yaml similarity index 100% rename from dependency/redis/1.0.72/templates/secret.yaml rename to dependency/redis/1.0.73/templates/secret.yaml diff --git a/dependency/redis/1.0.72/values.yaml b/dependency/redis/1.0.73/values.yaml similarity index 100% rename from dependency/redis/1.0.72/values.yaml rename to dependency/redis/1.0.73/values.yaml diff --git a/games/minecraft-java/0.0.7/CHANGELOG.md b/games/minecraft-java/0.0.8/CHANGELOG.md similarity index 88% rename from games/minecraft-java/0.0.7/CHANGELOG.md rename to games/minecraft-java/0.0.8/CHANGELOG.md index 3972fa7d42d..0c5ef854d38 100644 --- a/games/minecraft-java/0.0.7/CHANGELOG.md +++ b/games/minecraft-java/0.0.8/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [minecraft-java-0.0.8](https://github.com/truecharts/apps/compare/minecraft-java-0.0.7...minecraft-java-0.0.8) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [minecraft-java-0.0.7](https://github.com/truecharts/apps/compare/minecraft-java-0.0.6...minecraft-java-0.0.7) (2022-02-14) diff --git a/games/minecraft-java/0.0.7/CONFIG.md b/games/minecraft-java/0.0.8/CONFIG.md similarity index 100% rename from games/minecraft-java/0.0.7/CONFIG.md rename to games/minecraft-java/0.0.8/CONFIG.md diff --git a/games/minecraft-java/0.0.8/Chart.lock b/games/minecraft-java/0.0.8/Chart.lock new file mode 100644 index 00000000000..32d926c7b51 --- /dev/null +++ b/games/minecraft-java/0.0.8/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:43:09.081294598Z" diff --git a/games/minecraft-java/0.0.7/Chart.yaml b/games/minecraft-java/0.0.8/Chart.yaml similarity index 98% rename from games/minecraft-java/0.0.7/Chart.yaml rename to games/minecraft-java/0.0.8/Chart.yaml index 2fd0c4fa720..b736f7287a6 100644 --- a/games/minecraft-java/0.0.7/Chart.yaml +++ b/games/minecraft-java/0.0.8/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/itzg/docker-minecraft-server - https://hub.docker.com/r/itzg/minecraft-server type: application -version: 0.0.7 +version: 0.0.8 annotations: truecharts.org/catagories: | - games diff --git a/games/minecraft-java/0.0.7/README.md b/games/minecraft-java/0.0.8/README.md similarity index 100% rename from games/minecraft-java/0.0.7/README.md rename to games/minecraft-java/0.0.8/README.md diff --git a/games/minecraft-java/0.0.7/app-readme.md b/games/minecraft-java/0.0.8/app-readme.md similarity index 100% rename from games/minecraft-java/0.0.7/app-readme.md rename to games/minecraft-java/0.0.8/app-readme.md diff --git a/games/minecraft-java/0.0.7/charts/common-8.15.2.tgz b/games/minecraft-java/0.0.8/charts/common-8.15.2.tgz similarity index 100% rename from games/minecraft-java/0.0.7/charts/common-8.15.2.tgz rename to games/minecraft-java/0.0.8/charts/common-8.15.2.tgz diff --git a/games/minecraft-java/0.0.7/ci/base-values.yaml b/games/minecraft-java/0.0.8/ci/base-values.yaml similarity index 100% rename from games/minecraft-java/0.0.7/ci/base-values.yaml rename to games/minecraft-java/0.0.8/ci/base-values.yaml diff --git a/games/minecraft-java/0.0.7/ci/j11-values.yaml b/games/minecraft-java/0.0.8/ci/j11-values.yaml similarity index 54% rename from games/minecraft-java/0.0.7/ci/j11-values.yaml rename to games/minecraft-java/0.0.8/ci/j11-values.yaml index ba8f3cd4b94..7c9d1debfd1 100644 --- a/games/minecraft-java/0.0.7/ci/j11-values.yaml +++ b/games/minecraft-java/0.0.8/ci/j11-values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/minecraft-java11 - tag: latest@sha256:99418d96c7c5c4e2ffc990479851943267b0958a5369479101da2bb22acfdde0 + tag: latest@sha256:b762a932c5513406af39f73bbc17b9c31a2ac26d743116318475a6ba85d0ffa4 pullPolicy: Always env: diff --git a/games/minecraft-java/0.0.7/ci/j11j9-values.yaml b/games/minecraft-java/0.0.8/ci/j11j9-values.yaml similarity index 100% rename from games/minecraft-java/0.0.7/ci/j11j9-values.yaml rename to games/minecraft-java/0.0.8/ci/j11j9-values.yaml diff --git a/games/minecraft-java/0.0.7/ci/j8-values.yaml b/games/minecraft-java/0.0.8/ci/j8-values.yaml similarity index 56% rename from games/minecraft-java/0.0.7/ci/j8-values.yaml rename to games/minecraft-java/0.0.8/ci/j8-values.yaml index ffb1f7bfa3f..b3b5431d5c0 100644 --- a/games/minecraft-java/0.0.7/ci/j8-values.yaml +++ b/games/minecraft-java/0.0.8/ci/j8-values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/minecraft-java8-openj9 - tag: latest@sha256:e820e9a47c96c12fb8ca1cd99e79a012467097f7b3bbe3003805226d1ef39aa9 + tag: latest@sha256:29830ad99480f90e5dcf5f1a025187b63a8903140dcbc6088b20f83ff2fea237 pullPolicy: Always env: diff --git a/games/minecraft-java/0.0.7/ci/j8j9-values.yaml b/games/minecraft-java/0.0.8/ci/j8j9-values.yaml similarity index 100% rename from games/minecraft-java/0.0.7/ci/j8j9-values.yaml rename to games/minecraft-java/0.0.8/ci/j8j9-values.yaml diff --git a/games/minecraft-java/0.0.7/helm-values.md b/games/minecraft-java/0.0.8/helm-values.md similarity index 89% rename from games/minecraft-java/0.0.7/helm-values.md rename to games/minecraft-java/0.0.8/helm-values.md index 0250c3d4b63..68f650dfaf2 100644 --- a/games/minecraft-java/0.0.7/helm-values.md +++ b/games/minecraft-java/0.0.8/helm-values.md @@ -41,16 +41,16 @@ You will, however, be able to use all values referenced in the common chart here | image.tag | string | `"v2022.3.0@sha256:dc121eacba1f056fa287783d06a88dbb75bb50471cf0b6a8edcf04c96fd9dfc8"` | | | j11Image.pullPolicy | string | `"Always"` | | | j11Image.repository | string | `"tccr.io/truecharts/minecraft-java11"` | | -| j11Image.tag | string | `"latest@sha256:99418d96c7c5c4e2ffc990479851943267b0958a5369479101da2bb22acfdde0"` | | +| j11Image.tag | string | `"latest@sha256:b762a932c5513406af39f73bbc17b9c31a2ac26d743116318475a6ba85d0ffa4"` | | | j11j9Image.pullPolicy | string | `"Always"` | | | j11j9Image.repository | string | `"tccr.io/truecharts/minecraft-java11-openj9"` | | | j11j9Image.tag | string | `"latest@sha256:248ecbdca94efa8ab7c0b0437a0b59ba82ca9dabe6cd1f90a8cbd43319f15b82"` | | | j8Image.pullPolicy | string | `"Always"` | | | j8Image.repository | string | `"tccr.io/truecharts/minecraft-java8-openj9"` | | -| j8Image.tag | string | `"latest@sha256:e820e9a47c96c12fb8ca1cd99e79a012467097f7b3bbe3003805226d1ef39aa9"` | | +| j8Image.tag | string | `"latest@sha256:29830ad99480f90e5dcf5f1a025187b63a8903140dcbc6088b20f83ff2fea237"` | | | j8j9Image.pullPolicy | string | `"Always"` | | | j8j9Image.repository | string | `"tccr.io/truecharts/minecraft-java8-openj9"` | | -| j8j9Image.tag | string | `"latest@sha256:e820e9a47c96c12fb8ca1cd99e79a012467097f7b3bbe3003805226d1ef39aa9"` | | +| j8j9Image.tag | string | `"latest@sha256:29830ad99480f90e5dcf5f1a025187b63a8903140dcbc6088b20f83ff2fea237"` | | | persistence.data.enabled | bool | `true` | | | persistence.data.mountPath | string | `"/data"` | | | portal.enabled | bool | `false` | | diff --git a/games/minecraft-java/0.0.7/ix_values.yaml b/games/minecraft-java/0.0.8/ix_values.yaml similarity index 83% rename from games/minecraft-java/0.0.7/ix_values.yaml rename to games/minecraft-java/0.0.8/ix_values.yaml index 44515de09e7..3664f29bdb2 100644 --- a/games/minecraft-java/0.0.7/ix_values.yaml +++ b/games/minecraft-java/0.0.8/ix_values.yaml @@ -4,7 +4,7 @@ image: pullPolicy: Always j11Image: repository: tccr.io/truecharts/minecraft-java11 - tag: latest@sha256:99418d96c7c5c4e2ffc990479851943267b0958a5369479101da2bb22acfdde0 + tag: latest@sha256:b762a932c5513406af39f73bbc17b9c31a2ac26d743116318475a6ba85d0ffa4 pullPolicy: Always j11j9Image: repository: tccr.io/truecharts/minecraft-java11-openj9 @@ -12,11 +12,11 @@ j11j9Image: pullPolicy: Always j8Image: repository: tccr.io/truecharts/minecraft-java8-openj9 - tag: latest@sha256:e820e9a47c96c12fb8ca1cd99e79a012467097f7b3bbe3003805226d1ef39aa9 + tag: latest@sha256:29830ad99480f90e5dcf5f1a025187b63a8903140dcbc6088b20f83ff2fea237 pullPolicy: Always j8j9Image: repository: tccr.io/truecharts/minecraft-java8-openj9 - tag: latest@sha256:e820e9a47c96c12fb8ca1cd99e79a012467097f7b3bbe3003805226d1ef39aa9 + tag: latest@sha256:29830ad99480f90e5dcf5f1a025187b63a8903140dcbc6088b20f83ff2fea237 pullPolicy: Always portal: diff --git a/games/minecraft-java/0.0.7/questions.yaml b/games/minecraft-java/0.0.8/questions.yaml similarity index 100% rename from games/minecraft-java/0.0.7/questions.yaml rename to games/minecraft-java/0.0.8/questions.yaml diff --git a/games/minecraft-java/0.0.7/security.md b/games/minecraft-java/0.0.8/security.md similarity index 100% rename from games/minecraft-java/0.0.7/security.md rename to games/minecraft-java/0.0.8/security.md diff --git a/games/minecraft-java/0.0.7/templates/common.yaml b/games/minecraft-java/0.0.8/templates/common.yaml similarity index 100% rename from games/minecraft-java/0.0.7/templates/common.yaml rename to games/minecraft-java/0.0.8/templates/common.yaml diff --git a/games/minecraft-java/0.0.7/values.yaml b/games/minecraft-java/0.0.8/values.yaml similarity index 100% rename from games/minecraft-java/0.0.7/values.yaml rename to games/minecraft-java/0.0.8/values.yaml diff --git a/stable/anonaddy/6.0.35/CHANGELOG.md b/stable/anonaddy/6.0.36/CHANGELOG.md similarity index 91% rename from stable/anonaddy/6.0.35/CHANGELOG.md rename to stable/anonaddy/6.0.36/CHANGELOG.md index 79a4ebbfe06..bb891d61d2b 100644 --- a/stable/anonaddy/6.0.35/CHANGELOG.md +++ b/stable/anonaddy/6.0.36/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [anonaddy-6.0.36](https://github.com/truecharts/apps/compare/anonaddy-6.0.35...anonaddy-6.0.36) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [anonaddy-6.0.35](https://github.com/truecharts/apps/compare/anonaddy-6.0.34...anonaddy-6.0.35) (2022-02-10) @@ -88,12 +97,3 @@ ### [anonaddy-6.0.26](https://github.com/truecharts/apps/compare/anonaddy-6.0.25...anonaddy-6.0.26) (2022-01-21) #### Chore - -* update docker general non-major ([#1751](https://github.com/truecharts/apps/issues/1751)) - -#### Fix - -* set additional_attrs: true on all dicts ([#1750](https://github.com/truecharts/apps/issues/1750)) - - - diff --git a/stable/anonaddy/6.0.35/CONFIG.md b/stable/anonaddy/6.0.36/CONFIG.md similarity index 100% rename from stable/anonaddy/6.0.35/CONFIG.md rename to stable/anonaddy/6.0.36/CONFIG.md diff --git a/stable/anonaddy/6.0.35/Chart.lock b/stable/anonaddy/6.0.36/Chart.lock similarity index 87% rename from stable/anonaddy/6.0.35/Chart.lock rename to stable/anonaddy/6.0.36/Chart.lock index 5d704da4237..cd050240cdc 100644 --- a/stable/anonaddy/6.0.35/Chart.lock +++ b/stable/anonaddy/6.0.36/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://truecharts.org version: 1.0.71 digest: sha256:b1da3265f6cd1f2de737e63e8d697b533e3f12e3b717bfa59e79677a94d34a52 -generated: "2022-02-10T16:18:16.253452497Z" +generated: "2022-02-14T11:43:17.85931731Z" diff --git a/stable/anonaddy/6.0.35/Chart.yaml b/stable/anonaddy/6.0.36/Chart.yaml similarity index 95% rename from stable/anonaddy/6.0.35/Chart.yaml rename to stable/anonaddy/6.0.36/Chart.yaml index e1820ebf27b..bd75a96977d 100644 --- a/stable/anonaddy/6.0.35/Chart.yaml +++ b/stable/anonaddy/6.0.36/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "0.9.0" +appVersion: "0.9.1" dependencies: - name: common repository: https://truecharts.org @@ -25,7 +25,7 @@ maintainers: name: anonaddy sources: - https://github.com/anonaddy/docker -version: 6.0.35 +version: 6.0.36 annotations: truecharts.org/catagories: | - email diff --git a/stable/anonaddy/6.0.35/README.md b/stable/anonaddy/6.0.36/README.md similarity index 100% rename from stable/anonaddy/6.0.35/README.md rename to stable/anonaddy/6.0.36/README.md diff --git a/stable/anonaddy/6.0.35/app-readme.md b/stable/anonaddy/6.0.36/app-readme.md similarity index 100% rename from stable/anonaddy/6.0.35/app-readme.md rename to stable/anonaddy/6.0.36/app-readme.md diff --git a/stable/anonaddy/6.0.35/charts/common-8.15.2.tgz b/stable/anonaddy/6.0.36/charts/common-8.15.2.tgz similarity index 100% rename from stable/anonaddy/6.0.35/charts/common-8.15.2.tgz rename to stable/anonaddy/6.0.36/charts/common-8.15.2.tgz diff --git a/stable/anonaddy/6.0.35/charts/mariadb-1.0.68.tgz b/stable/anonaddy/6.0.36/charts/mariadb-1.0.68.tgz similarity index 100% rename from stable/anonaddy/6.0.35/charts/mariadb-1.0.68.tgz rename to stable/anonaddy/6.0.36/charts/mariadb-1.0.68.tgz diff --git a/stable/anonaddy/6.0.35/charts/redis-1.0.71.tgz b/stable/anonaddy/6.0.36/charts/redis-1.0.71.tgz similarity index 100% rename from stable/anonaddy/6.0.35/charts/redis-1.0.71.tgz rename to stable/anonaddy/6.0.36/charts/redis-1.0.71.tgz diff --git a/stable/anonaddy/6.0.35/helm-values.md b/stable/anonaddy/6.0.36/helm-values.md similarity index 96% rename from stable/anonaddy/6.0.35/helm-values.md rename to stable/anonaddy/6.0.36/helm-values.md index 39e58c1c06d..abe27ef78e2 100644 --- a/stable/anonaddy/6.0.35/helm-values.md +++ b/stable/anonaddy/6.0.36/helm-values.md @@ -27,7 +27,7 @@ You will, however, be able to use all values referenced in the common chart here | envValueFrom.REDIS_PASSWORD.secretKeyRef.name | string | `"rediscreds"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/anonaddy"` | | -| image.tag | string | `"v0.9.0@sha256:906d9d2e3af66490677c02110993babe10d94aac4150fa9a4cd232f24bb792c5"` | | +| image.tag | string | `"v0.9.1@sha256:cfab6686d26822a0bde3c7f016409c6248f5e971f60a8ad9edca5954fd6e2ae0"` | | | mariadb.enabled | bool | `true` | | | mariadb.existingSecret | string | `"mariadbcreds"` | | | mariadb.mariadbDatabase | string | `"anonaddy"` | | diff --git a/stable/anonaddy/6.0.35/ix_values.yaml b/stable/anonaddy/6.0.36/ix_values.yaml similarity index 95% rename from stable/anonaddy/6.0.35/ix_values.yaml rename to stable/anonaddy/6.0.36/ix_values.yaml index 508c4f39ba0..4946339aa3a 100644 --- a/stable/anonaddy/6.0.35/ix_values.yaml +++ b/stable/anonaddy/6.0.36/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/anonaddy - tag: v0.9.0@sha256:906d9d2e3af66490677c02110993babe10d94aac4150fa9a4cd232f24bb792c5 + tag: v0.9.1@sha256:cfab6686d26822a0bde3c7f016409c6248f5e971f60a8ad9edca5954fd6e2ae0 pullPolicy: IfNotPresent strategy: diff --git a/stable/anonaddy/6.0.35/questions.yaml b/stable/anonaddy/6.0.36/questions.yaml similarity index 100% rename from stable/anonaddy/6.0.35/questions.yaml rename to stable/anonaddy/6.0.36/questions.yaml diff --git a/stable/anonaddy/6.0.35/security.md b/stable/anonaddy/6.0.36/security.md similarity index 99% rename from stable/anonaddy/6.0.35/security.md rename to stable/anonaddy/6.0.36/security.md index 09f76c5b8b4..bc84af80079 100644 --- a/stable/anonaddy/6.0.35/security.md +++ b/stable/anonaddy/6.0.36/security.md @@ -93,7 +93,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/anonaddy:v0.9.0@sha256:906d9d2e3af66490677c02110993babe10d94aac4150fa9a4cd232f24bb792c5 + tccr.io/truecharts/anonaddy:v0.9.1@sha256:cfab6686d26822a0bde3c7f016409c6248f5e971f60a8ad9edca5954fd6e2ae0 tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/mariadb:v10.6.5@sha256:c791efc33f2d5fc972dc67bb015deba4b1a10def2b2f5058550f58415a34fb42 @@ -168,7 +168,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/anonaddy:v0.9.0@sha256:906d9d2e3af66490677c02110993babe10d94aac4150fa9a4cd232f24bb792c5 (alpine 3.15.0) +#### Container: tccr.io/truecharts/anonaddy:v0.9.1@sha256:cfab6686d26822a0bde3c7f016409c6248f5e971f60a8ad9edca5954fd6e2ae0 (alpine 3.15.0) **alpine** @@ -436,10 +436,9 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| **gobinary** @@ -680,10 +679,9 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| **gobinary** diff --git a/stable/anonaddy/6.0.35/templates/_appkey.tpl b/stable/anonaddy/6.0.36/templates/_appkey.tpl similarity index 100% rename from stable/anonaddy/6.0.35/templates/_appkey.tpl rename to stable/anonaddy/6.0.36/templates/_appkey.tpl diff --git a/stable/anonaddy/6.0.35/templates/common.yaml b/stable/anonaddy/6.0.36/templates/common.yaml similarity index 100% rename from stable/anonaddy/6.0.35/templates/common.yaml rename to stable/anonaddy/6.0.36/templates/common.yaml diff --git a/stable/anonaddy/6.0.35/values.yaml b/stable/anonaddy/6.0.36/values.yaml similarity index 100% rename from stable/anonaddy/6.0.35/values.yaml rename to stable/anonaddy/6.0.36/values.yaml diff --git a/stable/babybuddy/5.0.40/CHANGELOG.md b/stable/babybuddy/5.0.41/CHANGELOG.md similarity index 91% rename from stable/babybuddy/5.0.40/CHANGELOG.md rename to stable/babybuddy/5.0.41/CHANGELOG.md index e051db23184..2ac972ca741 100644 --- a/stable/babybuddy/5.0.40/CHANGELOG.md +++ b/stable/babybuddy/5.0.41/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [babybuddy-5.0.41](https://github.com/truecharts/apps/compare/babybuddy-5.0.40...babybuddy-5.0.41) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [babybuddy-5.0.40](https://github.com/truecharts/apps/compare/babybuddy-5.0.39...babybuddy-5.0.40) (2022-02-08) @@ -88,12 +97,3 @@ #### Chore -* update helm general non-major helm releases ([#1763](https://github.com/truecharts/apps/issues/1763)) - - - - -### [babybuddy-5.0.30](https://github.com/truecharts/apps/compare/babybuddy-5.0.29...babybuddy-5.0.30) (2022-01-21) - -#### Chore - diff --git a/stable/babybuddy/5.0.40/CONFIG.md b/stable/babybuddy/5.0.41/CONFIG.md similarity index 100% rename from stable/babybuddy/5.0.40/CONFIG.md rename to stable/babybuddy/5.0.41/CONFIG.md diff --git a/stable/babybuddy/5.0.40/Chart.lock b/stable/babybuddy/5.0.41/Chart.lock similarity index 84% rename from stable/babybuddy/5.0.40/Chart.lock rename to stable/babybuddy/5.0.41/Chart.lock index 678c2169797..4dee92324f3 100644 --- a/stable/babybuddy/5.0.40/Chart.lock +++ b/stable/babybuddy/5.0.41/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.66 digest: sha256:6bd36e97cd642be91c3e34a6215f34452bebf8467cb64870364ed83ce994bd2d -generated: "2022-02-08T16:30:45.575282169Z" +generated: "2022-02-14T11:43:17.826407923Z" diff --git a/stable/babybuddy/5.0.40/Chart.yaml b/stable/babybuddy/5.0.41/Chart.yaml similarity index 98% rename from stable/babybuddy/5.0.40/Chart.yaml rename to stable/babybuddy/5.0.41/Chart.yaml index e7a2ffdc72b..1b5d0f34779 100644 --- a/stable/babybuddy/5.0.40/Chart.yaml +++ b/stable/babybuddy/5.0.41/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v2 appVersion: "1.9.3" kubeVersion: '>=1.16.0-0' -version: 5.0.40 +version: 5.0.41 name: babybuddy description: Helps caregivers track sleep, feedings, diaper changes, tummy time and more to learn about and predict baby's needs without (as much) guess work. type: application diff --git a/stable/babybuddy/5.0.40/README.md b/stable/babybuddy/5.0.41/README.md similarity index 100% rename from stable/babybuddy/5.0.40/README.md rename to stable/babybuddy/5.0.41/README.md diff --git a/stable/babybuddy/5.0.40/app-readme.md b/stable/babybuddy/5.0.41/app-readme.md similarity index 100% rename from stable/babybuddy/5.0.40/app-readme.md rename to stable/babybuddy/5.0.41/app-readme.md diff --git a/stable/babybuddy/5.0.40/charts/common-8.15.2.tgz b/stable/babybuddy/5.0.41/charts/common-8.15.2.tgz similarity index 100% rename from stable/babybuddy/5.0.40/charts/common-8.15.2.tgz rename to stable/babybuddy/5.0.41/charts/common-8.15.2.tgz diff --git a/stable/babybuddy/5.0.40/charts/postgresql-6.0.66.tgz b/stable/babybuddy/5.0.41/charts/postgresql-6.0.66.tgz similarity index 100% rename from stable/babybuddy/5.0.40/charts/postgresql-6.0.66.tgz rename to stable/babybuddy/5.0.41/charts/postgresql-6.0.66.tgz diff --git a/stable/babybuddy/5.0.40/helm-values.md b/stable/babybuddy/5.0.41/helm-values.md similarity index 95% rename from stable/babybuddy/5.0.40/helm-values.md rename to stable/babybuddy/5.0.41/helm-values.md index 272bd1e0dc0..03e6c76d886 100644 --- a/stable/babybuddy/5.0.40/helm-values.md +++ b/stable/babybuddy/5.0.41/helm-values.md @@ -21,7 +21,7 @@ You will, however, be able to use all values referenced in the common chart here | envValueFrom.DB_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/babybuddy"` | | -| image.tag | string | `"v1.9.3@sha256:6fa60f37bc4b5be5d07b05344e7343f15b9103642fc04305dca0d751ca8f4836"` | | +| image.tag | string | `"v1.9.3@sha256:a069c8e3aeb2d33f08e9b4692aa5f0cd8b2ce439db09cb0223449f99d06c2c5d"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | persistence.varrun.enabled | bool | `true` | | diff --git a/stable/babybuddy/5.0.40/ix_values.yaml b/stable/babybuddy/5.0.41/ix_values.yaml similarity index 92% rename from stable/babybuddy/5.0.40/ix_values.yaml rename to stable/babybuddy/5.0.41/ix_values.yaml index 63ef6c8db5f..5125890642e 100644 --- a/stable/babybuddy/5.0.40/ix_values.yaml +++ b/stable/babybuddy/5.0.41/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/babybuddy pullPolicy: IfNotPresent - tag: v1.9.3@sha256:6fa60f37bc4b5be5d07b05344e7343f15b9103642fc04305dca0d751ca8f4836 + tag: v1.9.3@sha256:a069c8e3aeb2d33f08e9b4692aa5f0cd8b2ce439db09cb0223449f99d06c2c5d # See more environment variables in the babybuddy documentation # https://github.com/linuxserver/docker-babybuddy#parameters diff --git a/stable/babybuddy/5.0.40/questions.yaml b/stable/babybuddy/5.0.41/questions.yaml similarity index 100% rename from stable/babybuddy/5.0.40/questions.yaml rename to stable/babybuddy/5.0.41/questions.yaml diff --git a/stable/babybuddy/5.0.40/security.md b/stable/babybuddy/5.0.41/security.md similarity index 98% rename from stable/babybuddy/5.0.40/security.md rename to stable/babybuddy/5.0.41/security.md index 64e937a1f32..d698c9f047e 100644 --- a/stable/babybuddy/5.0.40/security.md +++ b/stable/babybuddy/5.0.41/security.md @@ -75,7 +75,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:c0975b3bbd08e750d6514e38961a2fcfacce0ec2ddf764583dff2bd54a062609 - tccr.io/truecharts/babybuddy:v1.9.3@sha256:6fa60f37bc4b5be5d07b05344e7343f15b9103642fc04305dca0d751ca8f4836 + tccr.io/truecharts/babybuddy:v1.9.3@sha256:a069c8e3aeb2d33f08e9b4692aa5f0cd8b2ce439db09cb0223449f99d06c2c5d tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:c0975b3bbd08e750d6514e38961a2fcfacce0ec2ddf764583dff2bd54a062609 @@ -377,10 +377,9 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| #### Container: Node.js @@ -399,9 +398,11 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| Django | CVE-2021-45115 | HIGH | 3.2.10 | 2.2.26, 3.2.11, 4.0.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45115
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-53qw-q765-4fww
https://groups.google.com/forum/#!forum/django-announce
https://nvd.nist.gov/vuln/detail/CVE-2021-45115
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| -| Django | CVE-2021-45116 | HIGH | 3.2.10 | 2.2.26, 3.2.11, 4.0.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45116
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-8c5j-9r9f-c6w8
https://groups.google.com/forum/#!forum/django-announce
https://nvd.nist.gov/vuln/detail/CVE-2021-45116
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| -| Django | CVE-2021-45452 | MEDIUM | 3.2.10 | 2.2.26, 3.2.11, 4.0.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45452
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-jrh2-hc4r-7jwx
https://groups.google.com/forum/#!forum/django-announce
https://nvd.nist.gov/vuln/detail/CVE-2021-45452
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| +| Django | CVE-2021-45115 | HIGH | 3.2.10 | 2.2.26, 3.2.11, 4.0.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45115
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-53qw-q765-4fww
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
https://nvd.nist.gov/vuln/detail/CVE-2021-45115
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| +| Django | CVE-2021-45116 | HIGH | 3.2.10 | 2.2.26, 3.2.11, 4.0.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45116
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-8c5j-9r9f-c6w8
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
https://nvd.nist.gov/vuln/detail/CVE-2021-45116
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| +| Django | CVE-2022-23833 | HIGH | 3.2.10 | 4.0.2, 3.2.12, 2.2.27 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23833
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-6cw3-g6wv-c2xv
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
https://nvd.nist.gov/vuln/detail/CVE-2022-23833
https://ubuntu.com/security/notices/USN-5269-1
https://ubuntu.com/security/notices/USN-5269-2
https://www.djangoproject.com/weblog/2022/feb/01/security-releases/
| +| Django | CVE-2021-45452 | MEDIUM | 3.2.10 | 2.2.26, 3.2.11, 4.0.1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45452
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-jrh2-hc4r-7jwx
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
https://nvd.nist.gov/vuln/detail/CVE-2021-45452
https://security.netapp.com/advisory/ntap-20220121-0005/
https://ubuntu.com/security/notices/USN-5204-1
https://www.djangoproject.com/weblog/2022/jan/04/security-releases/
| +| Django | CVE-2022-22818 | MEDIUM | 3.2.10 | 2.2.27, 4.0.2, 3.2.12 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22818
https://docs.djangoproject.com/en/4.0/releases/security/
https://github.com/advisories/GHSA-95rw-fx8r-36v6
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
https://nvd.nist.gov/vuln/detail/CVE-2022-22818
https://ubuntu.com/security/notices/USN-5269-1
https://ubuntu.com/security/notices/USN-5269-2
https://www.djangoproject.com/weblog/2022/feb/01/security-releases/
| | Pillow | CVE-2022-22815 | CRITICAL | 8.4.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22815
https://github.com/advisories/GHSA-pw3c-h7wp-cvhx
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22815
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| | Pillow | CVE-2022-22816 | CRITICAL | 8.4.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816
https://github.com/advisories/GHSA-xrcv-f9gm-v42c
https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22816
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| | Pillow | CVE-2022-22817 | CRITICAL | 8.4.0 | 9.0.0 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817
https://github.com/advisories/GHSA-8vj2-vxx3-667w
https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22817
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval
https://ubuntu.com/security/notices/USN-5227-1
https://ubuntu.com/security/notices/USN-5227-2
https://www.debian.org/security/2022/dsa-5053
| @@ -704,8 +705,7 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| diff --git a/stable/babybuddy/5.0.40/templates/common.yaml b/stable/babybuddy/5.0.41/templates/common.yaml similarity index 100% rename from stable/babybuddy/5.0.40/templates/common.yaml rename to stable/babybuddy/5.0.41/templates/common.yaml diff --git a/stable/babybuddy/5.0.40/values.yaml b/stable/babybuddy/5.0.41/values.yaml similarity index 100% rename from stable/babybuddy/5.0.40/values.yaml rename to stable/babybuddy/5.0.41/values.yaml diff --git a/stable/beets/2.0.43/Chart.lock b/stable/beets/2.0.43/Chart.lock deleted file mode 100644 index ac50f468c13..00000000000 --- a/stable/beets/2.0.43/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-08T16:31:06.256741417Z" diff --git a/stable/beets/2.0.43/CHANGELOG.md b/stable/beets/2.0.44/CHANGELOG.md similarity index 89% rename from stable/beets/2.0.43/CHANGELOG.md rename to stable/beets/2.0.44/CHANGELOG.md index e2aa60dbb0f..8589cf44288 100644 --- a/stable/beets/2.0.43/CHANGELOG.md +++ b/stable/beets/2.0.44/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [beets-2.0.44](https://github.com/truecharts/apps/compare/beets-2.0.43...beets-2.0.44) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [beets-2.0.43](https://github.com/truecharts/apps/compare/beets-2.0.42...beets-2.0.43) (2022-02-08) @@ -88,12 +97,3 @@ -### [beets-2.0.34](https://github.com/truecharts/apps/compare/beets-2.0.33...beets-2.0.34) (2022-01-13) - -#### Chore - -* update helm general non-major helm releases ([#1712](https://github.com/truecharts/apps/issues/1712)) - -#### Feat - -* expose capabilities in GUI ([#1709](https://github.com/truecharts/apps/issues/1709)) diff --git a/stable/beets/2.0.43/CONFIG.md b/stable/beets/2.0.44/CONFIG.md similarity index 100% rename from stable/beets/2.0.43/CONFIG.md rename to stable/beets/2.0.44/CONFIG.md diff --git a/stable/beets/2.0.44/Chart.lock b/stable/beets/2.0.44/Chart.lock new file mode 100644 index 00000000000..ff8cd0fe165 --- /dev/null +++ b/stable/beets/2.0.44/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:43:35.792161079Z" diff --git a/stable/beets/2.0.43/Chart.yaml b/stable/beets/2.0.44/Chart.yaml similarity index 97% rename from stable/beets/2.0.43/Chart.yaml rename to stable/beets/2.0.44/Chart.yaml index 84cf2970443..889499be22d 100644 --- a/stable/beets/2.0.43/Chart.yaml +++ b/stable/beets/2.0.44/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/linuxserver/docker-beets - https://beets.io/ type: application -version: 2.0.43 +version: 2.0.44 annotations: truecharts.org/catagories: | - media diff --git a/stable/beets/2.0.43/README.md b/stable/beets/2.0.44/README.md similarity index 100% rename from stable/beets/2.0.43/README.md rename to stable/beets/2.0.44/README.md diff --git a/stable/beets/2.0.43/app-readme.md b/stable/beets/2.0.44/app-readme.md similarity index 100% rename from stable/beets/2.0.43/app-readme.md rename to stable/beets/2.0.44/app-readme.md diff --git a/stable/beets/2.0.43/charts/common-8.15.2.tgz b/stable/beets/2.0.44/charts/common-8.15.2.tgz similarity index 100% rename from stable/beets/2.0.43/charts/common-8.15.2.tgz rename to stable/beets/2.0.44/charts/common-8.15.2.tgz diff --git a/stable/beets/2.0.43/helm-values.md b/stable/beets/2.0.44/helm-values.md similarity index 92% rename from stable/beets/2.0.43/helm-values.md rename to stable/beets/2.0.44/helm-values.md index a804ffd1b12..c590eb62a3d 100644 --- a/stable/beets/2.0.43/helm-values.md +++ b/stable/beets/2.0.44/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env.PUID | int | `568` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/beets"` | | -| image.tag | string | `"v1.6.0@sha256:c1cdee3b69e98f993fa01b72b41496d311a56d9ff214c0c86a697ff589a13f1c"` | | +| image.tag | string | `"v1.6.0@sha256:74f4a32f5309d15893ea39ebe55eaad363babd223848a4ab9880f26dfb836b57"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | persistence.varrun.enabled | bool | `true` | | diff --git a/stable/beets/2.0.43/ix_values.yaml b/stable/beets/2.0.44/ix_values.yaml similarity index 82% rename from stable/beets/2.0.43/ix_values.yaml rename to stable/beets/2.0.44/ix_values.yaml index 70576c823ae..1a35d4b44e1 100644 --- a/stable/beets/2.0.43/ix_values.yaml +++ b/stable/beets/2.0.44/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/beets pullPolicy: IfNotPresent - tag: v1.6.0@sha256:c1cdee3b69e98f993fa01b72b41496d311a56d9ff214c0c86a697ff589a13f1c + tag: v1.6.0@sha256:74f4a32f5309d15893ea39ebe55eaad363babd223848a4ab9880f26dfb836b57 env: PUID: 568 diff --git a/stable/beets/2.0.43/questions.yaml b/stable/beets/2.0.44/questions.yaml similarity index 100% rename from stable/beets/2.0.43/questions.yaml rename to stable/beets/2.0.44/questions.yaml diff --git a/stable/beets/2.0.43/security.md b/stable/beets/2.0.44/security.md similarity index 99% rename from stable/beets/2.0.43/security.md rename to stable/beets/2.0.44/security.md index 2d8273742d8..fac472e3703 100644 --- a/stable/beets/2.0.43/security.md +++ b/stable/beets/2.0.44/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/beets:v1.6.0@sha256:c1cdee3b69e98f993fa01b72b41496d311a56d9ff214c0c86a697ff589a13f1c + tccr.io/truecharts/beets:v1.6.0@sha256:74f4a32f5309d15893ea39ebe55eaad363babd223848a4ab9880f26dfb836b57 ##### Scan Results diff --git a/stable/beets/2.0.43/templates/common.yaml b/stable/beets/2.0.44/templates/common.yaml similarity index 100% rename from stable/beets/2.0.43/templates/common.yaml rename to stable/beets/2.0.44/templates/common.yaml diff --git a/stable/beets/2.0.43/values.yaml b/stable/beets/2.0.44/values.yaml similarity index 100% rename from stable/beets/2.0.43/values.yaml rename to stable/beets/2.0.44/values.yaml diff --git a/stable/booksonic-air/4.0.43/Chart.lock b/stable/booksonic-air/4.0.43/Chart.lock deleted file mode 100644 index 2ef5907c212..00000000000 --- a/stable/booksonic-air/4.0.43/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-08T16:31:40.026448967Z" diff --git a/stable/booksonic-air/4.0.43/CHANGELOG.md b/stable/booksonic-air/4.0.44/CHANGELOG.md similarity index 91% rename from stable/booksonic-air/4.0.43/CHANGELOG.md rename to stable/booksonic-air/4.0.44/CHANGELOG.md index dc8b4b1c17e..9fb3571080b 100644 --- a/stable/booksonic-air/4.0.43/CHANGELOG.md +++ b/stable/booksonic-air/4.0.44/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [booksonic-air-4.0.44](https://github.com/truecharts/apps/compare/booksonic-air-4.0.43...booksonic-air-4.0.44) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [booksonic-air-4.0.43](https://github.com/truecharts/apps/compare/booksonic-air-4.0.42...booksonic-air-4.0.43) (2022-02-08) @@ -88,12 +97,3 @@ -### [booksonic-air-4.0.34](https://github.com/truecharts/apps/compare/booksonic-air-4.0.33...booksonic-air-4.0.34) (2022-01-18) - -#### Chore - -* update helm general non-major helm releases ([#1732](https://github.com/truecharts/apps/issues/1732)) - - - - diff --git a/stable/booksonic-air/4.0.43/CONFIG.md b/stable/booksonic-air/4.0.44/CONFIG.md similarity index 100% rename from stable/booksonic-air/4.0.43/CONFIG.md rename to stable/booksonic-air/4.0.44/CONFIG.md diff --git a/stable/booksonic-air/4.0.44/Chart.lock b/stable/booksonic-air/4.0.44/Chart.lock new file mode 100644 index 00000000000..4cfd6117449 --- /dev/null +++ b/stable/booksonic-air/4.0.44/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:43:41.198498385Z" diff --git a/stable/booksonic-air/4.0.43/Chart.yaml b/stable/booksonic-air/4.0.44/Chart.yaml similarity index 97% rename from stable/booksonic-air/4.0.43/Chart.yaml rename to stable/booksonic-air/4.0.44/Chart.yaml index 2c2a096d45c..db41fe52619 100644 --- a/stable/booksonic-air/4.0.43/Chart.yaml +++ b/stable/booksonic-air/4.0.44/Chart.yaml @@ -20,7 +20,7 @@ name: booksonic-air sources: - https://github.com/popeen/Booksonic-Air - https://hub.docker.com/r/linuxserver/booksonic-air -version: 4.0.43 +version: 4.0.44 annotations: truecharts.org/catagories: | - media diff --git a/stable/booksonic-air/4.0.43/README.md b/stable/booksonic-air/4.0.44/README.md similarity index 100% rename from stable/booksonic-air/4.0.43/README.md rename to stable/booksonic-air/4.0.44/README.md diff --git a/stable/booksonic-air/4.0.43/app-readme.md b/stable/booksonic-air/4.0.44/app-readme.md similarity index 100% rename from stable/booksonic-air/4.0.43/app-readme.md rename to stable/booksonic-air/4.0.44/app-readme.md diff --git a/stable/booksonic-air/4.0.43/charts/common-8.15.2.tgz b/stable/booksonic-air/4.0.44/charts/common-8.15.2.tgz similarity index 100% rename from stable/booksonic-air/4.0.43/charts/common-8.15.2.tgz rename to stable/booksonic-air/4.0.44/charts/common-8.15.2.tgz diff --git a/stable/booksonic-air/4.0.43/helm-values.md b/stable/booksonic-air/4.0.44/helm-values.md similarity index 92% rename from stable/booksonic-air/4.0.43/helm-values.md rename to stable/booksonic-air/4.0.44/helm-values.md index 91bddefe9d8..84cf9968000 100644 --- a/stable/booksonic-air/4.0.43/helm-values.md +++ b/stable/booksonic-air/4.0.44/helm-values.md @@ -15,7 +15,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"UTC"` | Set the container timezone | | image.pullPolicy | string | `"IfNotPresent"` | image pull policy | | image.repository | string | `"tccr.io/truecharts/booksonic-air"` | image repository | -| image.tag | string | `"v2201.1.0@sha256:f98f856134cce6d583d80e98672acae58fc167378567c9495d39c28e6cc1442b"` | image tag | +| image.tag | string | `"v2201.1.0@sha256:ac65cccaa396d97a06404f87cc635aefe0f65402fc8a1ce78cfe2e19351acec2"` | image tag | | persistence | object | See values.yaml | Configure persistence settings for the chart under this key. | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/stable/booksonic-air/4.0.43/ix_values.yaml b/stable/booksonic-air/4.0.44/ix_values.yaml similarity index 91% rename from stable/booksonic-air/4.0.43/ix_values.yaml rename to stable/booksonic-air/4.0.44/ix_values.yaml index fd2d365ac44..620d6beb2c2 100644 --- a/stable/booksonic-air/4.0.43/ix_values.yaml +++ b/stable/booksonic-air/4.0.44/ix_values.yaml @@ -4,7 +4,7 @@ image: # -- image pull policy pullPolicy: IfNotPresent # -- image tag - tag: v2201.1.0@sha256:f98f856134cce6d583d80e98672acae58fc167378567c9495d39c28e6cc1442b + tag: v2201.1.0@sha256:ac65cccaa396d97a06404f87cc635aefe0f65402fc8a1ce78cfe2e19351acec2 securityContext: readOnlyRootFilesystem: false diff --git a/stable/booksonic-air/4.0.43/questions.yaml b/stable/booksonic-air/4.0.44/questions.yaml similarity index 100% rename from stable/booksonic-air/4.0.43/questions.yaml rename to stable/booksonic-air/4.0.44/questions.yaml diff --git a/stable/booksonic-air/4.0.43/security.md b/stable/booksonic-air/4.0.44/security.md similarity index 98% rename from stable/booksonic-air/4.0.43/security.md rename to stable/booksonic-air/4.0.44/security.md index 76b86ada407..3f14d0f3220 100644 --- a/stable/booksonic-air/4.0.43/security.md +++ b/stable/booksonic-air/4.0.44/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/booksonic-air:v2201.1.0@sha256:f98f856134cce6d583d80e98672acae58fc167378567c9495d39c28e6cc1442b + tccr.io/truecharts/booksonic-air:v2201.1.0@sha256:ac65cccaa396d97a06404f87cc635aefe0f65402fc8a1ce78cfe2e19351acec2 ##### Scan Results @@ -114,7 +114,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/booksonic-air:v2201.1.0@sha256:f98f856134cce6d583d80e98672acae58fc167378567c9495d39c28e6cc1442b (ubuntu 18.04) +#### Container: tccr.io/truecharts/booksonic-air:v2201.1.0@sha256:ac65cccaa396d97a06404f87cc635aefe0f65402fc8a1ce78cfe2e19351acec2 (ubuntu 18.04) **ubuntu** @@ -434,8 +434,6 @@ hide: | libavutil55 | CVE-2020-20902 | LOW | 7:3.4.8-0ubuntu0.2 | |
Expand...http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20902
https://trac.ffmpeg.org/ticket/8176
| | libc-bin | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | libc-bin | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| libc-bin | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| libc-bin | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc-bin | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | libc-bin | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | libc-bin | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -447,10 +445,10 @@ hide: | libc-bin | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libc-bin | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc-bin | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | libc6 | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| libc6 | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| libc6 | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | libc6 | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | libc6 | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -462,6 +460,8 @@ hide: | libc6 | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libc6 | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc6 | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libcairo2 | CVE-2017-7475 | LOW | 1.15.10-2ubuntu0.1 | |
Expand...http://seclists.org/oss-sec/2017/q2/151
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
https://github.com/advisories/GHSA-5v3f-73gv-x7x5
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
| | libcairo2 | CVE-2017-9814 | LOW | 1.15.10-2ubuntu0.1 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00042.html
https://bugs.freedesktop.org/show_bug.cgi?id=101547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/201904-01
| | libcairo2 | CVE-2018-18064 | LOW | 1.15.10-2ubuntu0.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -474,8 +474,8 @@ hide: | libcups2 | CVE-2019-8842 | LOW | 2.2.7-1ubuntu2.8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT210788
| | libcups2 | CVE-2020-10001 | LOW | 2.2.7-1ubuntu2.8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
https://linux.oracle.com/cve/CVE-2020-10001.html
https://linux.oracle.com/errata/ELSA-2021-4393.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html
https://support.apple.com/en-us/HT212011
| | libdbus-1-3 | CVE-2020-35512 | LOW | 1.12.2-1ubuntu1.2 | |
Expand...https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
| -| libexpat1 | CVE-2022-23852 | MEDIUM | 2.2.5-3ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
| -| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.5-3ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
| +| libexpat1 | CVE-2022-23852 | MEDIUM | 2.2.5-3ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.5-3ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://www.tenable.com/security/tns-2022-05
| | libflac8 | CVE-2020-0499 | LOW | 1.3.2-1 | |
Expand...https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/
https://source.android.com/security/bulletin/pixel/2020-12-01
| | libgcc1 | CVE-2020-13844 | MEDIUM | 8.4.0-1ubuntu1~18.04 | |
Expand...http://lists.llvm.org/pipermail/llvm-dev/2020-June/142109.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/frequently-asked-questions
https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547520.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=679db70801da9fda91d26caf13bf5b5ccc74e8e8
| | libgdk-pixbuf2.0-0 | CVE-2021-44648 | MEDIUM | 2.36.11-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
| @@ -725,8 +725,6 @@ hide: | libzmq5 | CVE-2021-20236 | MEDIUM | 4.2.5-1ubuntu0.2 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1921976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236
https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
| | locales | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | locales | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| locales | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| locales | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | locales | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | locales | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | locales | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -738,11 +736,11 @@ hide: | locales | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | locales | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | locales | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | login | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2.2 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | multiarch-support | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | multiarch-support | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| multiarch-support | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| multiarch-support | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | multiarch-support | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | multiarch-support | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | multiarch-support | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -754,6 +752,8 @@ hide: | multiarch-support | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | multiarch-support | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | multiarch-support | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| multiarch-support | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| multiarch-support | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| @@ -769,6 +769,7 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | ch.qos.logback:logback-core | CVE-2021-42550 | MEDIUM | 1.2.3 | |
Expand...http://logback.qos.ch/news.html
https://cve.report/CVE-2021-42550
https://github.com/advisories/GHSA-668q-qrv7-99fm
https://github.com/cn-panda/logbackRceDemo
https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html
https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c
https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42
https://jira.qos.ch/browse/LOGBACK-1591
https://nvd.nist.gov/vuln/detail/CVE-2021-42550
https://security.netapp.com/advisory/ntap-20211229-0001/
| | org.apache.logging.log4j:log4j-api | CVE-2021-44832 | MEDIUM | 2.17.0 | 2.17.1, 2.12.4, 2.3.2 |
Expand...http://www.openwall.com/lists/oss-security/2021/12/28/1
https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832
https://github.com/advisories/GHSA-8489-44mv-ggj8
https://github.com/apache/logging-log4j2/commit/05db5f9527254632b59aed2a1d78a32c5ab74f16
https://issues.apache.org/jira/browse/LOG4J2-3293
https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143
https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/
https://nvd.nist.gov/vuln/detail/CVE-2021-44832
https://security.netapp.com/advisory/ntap-20220104-0001/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
https://ubuntu.com/security/notices/USN-5222-1
https://www.oracle.com/security-alerts/cpujan2022.html
| +| org.postgresql:postgresql | CVE-2020-13692 | HIGH | 42.2.12 | 42.2.13 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13692
https://github.com/advisories/GHSA-88cc-g835-76rp
https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65
https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13
https://linux.oracle.com/cve/CVE-2020-13692.html
https://linux.oracle.com/errata/ELSA-2020-3285.html
https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E
https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E
https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/
https://nvd.nist.gov/vuln/detail/CVE-2020-13692
https://security.netapp.com/advisory/ntap-20200619-0005/
| | org.postgresql:postgresql | CVE-2022-21724 | HIGH | 42.2.12 | 42.3.2, 42.2.25 |
Expand...https://github.com/advisories/GHSA-v7wg-cpwc-24m4
https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813
https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4
https://nvd.nist.gov/vuln/detail/CVE-2022-21724
| | org.springframework.security:spring-security-core | CVE-2021-22112 | HIGH | 5.2.8.RELEASE | 5.2.9.RELEASE, 5.3.8.RELEASE, 5.4.4 |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/7
https://github.com/advisories/GHSA-gq28-h5vg-8prx
https://github.com/spring-projects/spring-security/releases/tag/5.4.4
https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E
https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E
https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-22112
https://tanzu.vmware.com/security/cve-2021-22112
https://www.jenkins.io/security/advisory/2021-02-19/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | org.springframework.security:spring-security-core | CVE-2021-22119 | HIGH | 5.2.8.RELEASE | 5.2.11.RELEASE, 5.3.10.RELEASE, 5.4.7, 5.5.1 |
Expand...https://github.com/advisories/GHSA-w9jg-gvgr-354m
https://github.com/spring-projects/spring-security/pull/9513
https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E
https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E
https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-22119
https://tanzu.vmware.com/security/cve-2021-22119
https://www.oracle.com/security-alerts/cpujan2022.html
| diff --git a/stable/booksonic-air/4.0.43/templates/common.yaml b/stable/booksonic-air/4.0.44/templates/common.yaml similarity index 100% rename from stable/booksonic-air/4.0.43/templates/common.yaml rename to stable/booksonic-air/4.0.44/templates/common.yaml diff --git a/stable/booksonic-air/4.0.43/values.yaml b/stable/booksonic-air/4.0.44/values.yaml similarity index 100% rename from stable/booksonic-air/4.0.43/values.yaml rename to stable/booksonic-air/4.0.44/values.yaml diff --git a/stable/clamav/1.0.8/Chart.lock b/stable/clamav/1.0.8/Chart.lock deleted file mode 100644 index 17e7f643b49..00000000000 --- a/stable/clamav/1.0.8/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-08T16:32:34.549386276Z" diff --git a/stable/clamav/1.0.8/CHANGELOG.md b/stable/clamav/1.0.9/CHANGELOG.md similarity index 91% rename from stable/clamav/1.0.8/CHANGELOG.md rename to stable/clamav/1.0.9/CHANGELOG.md index d260b54af7e..11fafa7b61a 100644 --- a/stable/clamav/1.0.8/CHANGELOG.md +++ b/stable/clamav/1.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [clamav-1.0.9](https://github.com/truecharts/apps/compare/clamav-1.0.8...clamav-1.0.9) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [clamav-1.0.8](https://github.com/truecharts/apps/compare/clamav-1.0.7...clamav-1.0.8) (2022-02-08) @@ -88,12 +97,3 @@ ### [clamav-0.0.3](https://github.com/truecharts/apps/compare/clamav-0.0.2...clamav-0.0.3) (2022-01-20) - -#### Fix - -* enable service ([#1742](https://github.com/truecharts/apps/issues/1742)) - - - - -### [clamav-0.0.2](https://github.com/truecharts/apps/compare/clamav-0.0.1...clamav-0.0.2) (2022-01-18) diff --git a/stable/clamav/1.0.8/CONFIG.md b/stable/clamav/1.0.9/CONFIG.md similarity index 100% rename from stable/clamav/1.0.8/CONFIG.md rename to stable/clamav/1.0.9/CONFIG.md diff --git a/stable/clamav/1.0.9/Chart.lock b/stable/clamav/1.0.9/Chart.lock new file mode 100644 index 00000000000..74ba6351085 --- /dev/null +++ b/stable/clamav/1.0.9/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:44:22.072294378Z" diff --git a/stable/clamav/1.0.8/Chart.yaml b/stable/clamav/1.0.9/Chart.yaml similarity index 98% rename from stable/clamav/1.0.8/Chart.yaml rename to stable/clamav/1.0.9/Chart.yaml index 3af08862c1a..e39f56af80e 100644 --- a/stable/clamav/1.0.8/Chart.yaml +++ b/stable/clamav/1.0.9/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://hub.docker.com/r/clamav/clamav - https://docs.clamav.net/ type: application -version: 1.0.8 +version: 1.0.9 annotations: truecharts.org/catagories: | - utilities diff --git a/stable/clamav/1.0.8/README.md b/stable/clamav/1.0.9/README.md similarity index 100% rename from stable/clamav/1.0.8/README.md rename to stable/clamav/1.0.9/README.md diff --git a/stable/clamav/1.0.8/app-readme.md b/stable/clamav/1.0.9/app-readme.md similarity index 100% rename from stable/clamav/1.0.8/app-readme.md rename to stable/clamav/1.0.9/app-readme.md diff --git a/stable/clamav/1.0.8/charts/common-8.15.2.tgz b/stable/clamav/1.0.9/charts/common-8.15.2.tgz similarity index 100% rename from stable/clamav/1.0.8/charts/common-8.15.2.tgz rename to stable/clamav/1.0.9/charts/common-8.15.2.tgz diff --git a/stable/clamav/1.0.8/helm-values.md b/stable/clamav/1.0.9/helm-values.md similarity index 96% rename from stable/clamav/1.0.8/helm-values.md rename to stable/clamav/1.0.9/helm-values.md index a65561eb718..47abf895b48 100644 --- a/stable/clamav/1.0.8/helm-values.md +++ b/stable/clamav/1.0.9/helm-values.md @@ -18,7 +18,7 @@ You will, however, be able to use all values referenced in the common chart here | env.FRESHCLAM_CHECKS | int | `1` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/clamav"` | | -| image.tag | string | `"v0.104.2@sha256:d30296ee9d7520f4d422a8933cbc9d03218ffdfcfaec3ed257306a5077b4f1d5"` | | +| image.tag | string | `"v0.104.2@sha256:7826f702c4536273f15555ab12979e358aa730eb07816139bbfda3ce5bf8d5ca"` | | | persistence.scandir.enabled | bool | `true` | | | persistence.scandir.mountPath | string | `"/scandir"` | | | persistence.scandir.readOnly | bool | `true` | | diff --git a/stable/clamav/1.0.8/ix_values.yaml b/stable/clamav/1.0.9/ix_values.yaml similarity index 93% rename from stable/clamav/1.0.8/ix_values.yaml rename to stable/clamav/1.0.9/ix_values.yaml index aa00e1b54d0..8aa90b96800 100644 --- a/stable/clamav/1.0.8/ix_values.yaml +++ b/stable/clamav/1.0.9/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/clamav pullPolicy: IfNotPresent - tag: v0.104.2@sha256:d30296ee9d7520f4d422a8933cbc9d03218ffdfcfaec3ed257306a5077b4f1d5 + tag: v0.104.2@sha256:7826f702c4536273f15555ab12979e358aa730eb07816139bbfda3ce5bf8d5ca podSecurityContext: runAsUser: 0 diff --git a/stable/clamav/1.0.8/questions.yaml b/stable/clamav/1.0.9/questions.yaml similarity index 100% rename from stable/clamav/1.0.8/questions.yaml rename to stable/clamav/1.0.9/questions.yaml diff --git a/stable/clamav/1.0.8/security.md b/stable/clamav/1.0.9/security.md similarity index 99% rename from stable/clamav/1.0.8/security.md rename to stable/clamav/1.0.9/security.md index 7c093af59a3..88fcdc037d1 100644 --- a/stable/clamav/1.0.8/security.md +++ b/stable/clamav/1.0.9/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/clamav:v0.104.2@sha256:d30296ee9d7520f4d422a8933cbc9d03218ffdfcfaec3ed257306a5077b4f1d5 + tccr.io/truecharts/clamav:v0.104.2@sha256:7826f702c4536273f15555ab12979e358aa730eb07816139bbfda3ce5bf8d5ca ##### Scan Results @@ -114,7 +114,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/clamav:v0.104.2@sha256:d30296ee9d7520f4d422a8933cbc9d03218ffdfcfaec3ed257306a5077b4f1d5 (alpine 3.14.2) +#### Container: tccr.io/truecharts/clamav:v0.104.2@sha256:7826f702c4536273f15555ab12979e358aa730eb07816139bbfda3ce5bf8d5ca (alpine 3.14.2) **alpine** diff --git a/stable/clamav/1.0.8/templates/common.yaml b/stable/clamav/1.0.9/templates/common.yaml similarity index 100% rename from stable/clamav/1.0.8/templates/common.yaml rename to stable/clamav/1.0.9/templates/common.yaml diff --git a/stable/clamav/1.0.8/values.yaml b/stable/clamav/1.0.9/values.yaml similarity index 100% rename from stable/clamav/1.0.8/values.yaml rename to stable/clamav/1.0.9/values.yaml diff --git a/stable/code-server/2.1.24/Chart.lock b/stable/code-server/2.1.24/Chart.lock deleted file mode 100644 index 68df7a7c497..00000000000 --- a/stable/code-server/2.1.24/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-08T16:33:13.826705364Z" diff --git a/stable/code-server/2.1.24/CHANGELOG.md b/stable/code-server/2.1.25/CHANGELOG.md similarity index 91% rename from stable/code-server/2.1.24/CHANGELOG.md rename to stable/code-server/2.1.25/CHANGELOG.md index 4d629749e3e..a7bebbba717 100644 --- a/stable/code-server/2.1.24/CHANGELOG.md +++ b/stable/code-server/2.1.25/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [code-server-2.1.25](https://github.com/truecharts/apps/compare/openvscode-server-0.0.25...code-server-2.1.25) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [code-server-2.1.24](https://github.com/truecharts/apps/compare/openvscode-server-0.0.23...code-server-2.1.24) (2022-02-08) @@ -88,12 +97,3 @@ ### [code-server-2.1.15](https://github.com/truecharts/apps/compare/code-server-2.1.14...code-server-2.1.15) (2022-01-13) - -#### Chore - -* update helm general non-major helm releases ([#1712](https://github.com/truecharts/apps/issues/1712)) - -#### Feat - -* expose capabilities in GUI ([#1709](https://github.com/truecharts/apps/issues/1709)) - diff --git a/stable/code-server/2.1.24/CONFIG.md b/stable/code-server/2.1.25/CONFIG.md similarity index 100% rename from stable/code-server/2.1.24/CONFIG.md rename to stable/code-server/2.1.25/CONFIG.md diff --git a/stable/code-server/2.1.25/Chart.lock b/stable/code-server/2.1.25/Chart.lock new file mode 100644 index 00000000000..32540f397a5 --- /dev/null +++ b/stable/code-server/2.1.25/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:44:26.125524783Z" diff --git a/stable/code-server/2.1.24/Chart.yaml b/stable/code-server/2.1.25/Chart.yaml similarity index 97% rename from stable/code-server/2.1.24/Chart.yaml rename to stable/code-server/2.1.25/Chart.yaml index a97773ed152..a47257969a9 100644 --- a/stable/code-server/2.1.24/Chart.yaml +++ b/stable/code-server/2.1.25/Chart.yaml @@ -21,7 +21,7 @@ name: code-server sources: - https://github.com/cdr/code-server type: application -version: 2.1.24 +version: 2.1.25 annotations: truecharts.org/catagories: | - media diff --git a/stable/code-server/2.1.24/README.md b/stable/code-server/2.1.25/README.md similarity index 100% rename from stable/code-server/2.1.24/README.md rename to stable/code-server/2.1.25/README.md diff --git a/stable/code-server/2.1.24/app-readme.md b/stable/code-server/2.1.25/app-readme.md similarity index 100% rename from stable/code-server/2.1.24/app-readme.md rename to stable/code-server/2.1.25/app-readme.md diff --git a/stable/code-server/2.1.24/charts/common-8.15.2.tgz b/stable/code-server/2.1.25/charts/common-8.15.2.tgz similarity index 100% rename from stable/code-server/2.1.24/charts/common-8.15.2.tgz rename to stable/code-server/2.1.25/charts/common-8.15.2.tgz diff --git a/stable/code-server/2.1.24/helm-values.md b/stable/code-server/2.1.25/helm-values.md similarity index 92% rename from stable/code-server/2.1.24/helm-values.md rename to stable/code-server/2.1.25/helm-values.md index 554bf05bff1..dc4bbf6cb0b 100644 --- a/stable/code-server/2.1.24/helm-values.md +++ b/stable/code-server/2.1.25/helm-values.md @@ -18,7 +18,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/code-server"` | | -| image.tag | string | `"v4.0.2@sha256:48e7660ccfdc3cadc7f1a952cbb241d96412f79a7154ceb77b70bbc38484f224"` | | +| image.tag | string | `"v4.0.2@sha256:f97835402cf3006fcffb9e3a5cb64df8e78aa41ef4ba50a3158c9422229d2f7e"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | securityContext.allowPrivilegeEscalation | bool | `true` | | diff --git a/stable/code-server/2.1.24/ix_values.yaml b/stable/code-server/2.1.25/ix_values.yaml similarity index 83% rename from stable/code-server/2.1.24/ix_values.yaml rename to stable/code-server/2.1.25/ix_values.yaml index 59b69d3dc1e..412523b1793 100644 --- a/stable/code-server/2.1.24/ix_values.yaml +++ b/stable/code-server/2.1.25/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/code-server pullPolicy: IfNotPresent - tag: v4.0.2@sha256:48e7660ccfdc3cadc7f1a952cbb241d96412f79a7154ceb77b70bbc38484f224 + tag: v4.0.2@sha256:f97835402cf3006fcffb9e3a5cb64df8e78aa41ef4ba50a3158c9422229d2f7e args: - --user-data-dir diff --git a/stable/code-server/2.1.24/questions.yaml b/stable/code-server/2.1.25/questions.yaml similarity index 100% rename from stable/code-server/2.1.24/questions.yaml rename to stable/code-server/2.1.25/questions.yaml diff --git a/stable/code-server/2.1.24/security.md b/stable/code-server/2.1.25/security.md similarity index 96% rename from stable/code-server/2.1.24/security.md rename to stable/code-server/2.1.25/security.md index c511fd13aee..32facc47400 100644 --- a/stable/code-server/2.1.24/security.md +++ b/stable/code-server/2.1.25/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/code-server:v4.0.2@sha256:48e7660ccfdc3cadc7f1a952cbb241d96412f79a7154ceb77b70bbc38484f224 + tccr.io/truecharts/code-server:v4.0.2@sha256:f97835402cf3006fcffb9e3a5cb64df8e78aa41ef4ba50a3158c9422229d2f7e ##### Scan Results @@ -114,7 +114,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/code-server:v4.0.2@sha256:48e7660ccfdc3cadc7f1a952cbb241d96412f79a7154ceb77b70bbc38484f224 (debian 11.2) +#### Container: tccr.io/truecharts/code-server:v4.0.2@sha256:f97835402cf3006fcffb9e3a5cb64df8e78aa41ef4ba50a3158c9422229d2f7e (debian 11.2) **debian** @@ -133,7 +133,9 @@ hide: | curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | git | CVE-2018-1000021 | LOW | 1:2.30.2-1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git | CVE-2022-24975 | LOW | 1:2.30.2-1 | |
Expand...https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191
https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
| | git-man | CVE-2018-1000021 | LOW | 1:2.30.2-1 | |
Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
| +| git-man | CVE-2022-24975 | LOW | 1:2.30.2-1 | |
Expand...https://github.com/git/git/blob/2dc94da3744bfbbf145eca587a0f5ff480cc5867/Documentation/git-clone.txt#L185-L191
https://wwws.nightwatchcybersecurity.com/2022/02/11/gitbleed/
| | libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 | |
Expand...https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
| | libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| @@ -188,16 +190,16 @@ hide: | libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| -| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| -| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| -| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.10-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
| -| libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.10-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
| -| libexpat1 | CVE-2021-45960 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://security.netapp.com/advisory/ntap-20220121-0004/
| -| libexpat1 | CVE-2021-46143 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://security.netapp.com/advisory/ntap-20220121-0006/
| -| libexpat1 | CVE-2022-22825 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| -| libexpat1 | CVE-2022-22826 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| -| libexpat1 | CVE-2022-22827 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
| +| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2021-45960 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://security.netapp.com/advisory/ntap-20220121-0004/
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2021-46143 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://security.netapp.com/advisory/ntap-20220121-0006/
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22825 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22826 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22827 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| | libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| | libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| @@ -232,14 +234,14 @@ hide: | libpython3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| | libpython3.9-minimal | CVE-2021-3737 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| | libpython3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| -| libpython3.9-minimal | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...
| +| libpython3.9-minimal | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43882
| | libpython3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| | libpython3.9-stdlib | CVE-2021-29921 | CRITICAL | 3.9.2-1 | |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libpython3.9-stdlib | CVE-2021-3426 | MEDIUM | 3.9.2-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libpython3.9-stdlib | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| | libpython3.9-stdlib | CVE-2021-3737 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| | libpython3.9-stdlib | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| -| libpython3.9-stdlib | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...
| +| libpython3.9-stdlib | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43882
| | libpython3.9-stdlib | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| | libsepol1 | CVE-2021-36084 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| | libsepol1 | CVE-2021-36085 | LOW | 3.1-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| @@ -304,14 +306,14 @@ hide: | python3.9 | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| | python3.9 | CVE-2021-3737 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| | python3.9 | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| -| python3.9 | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...
| +| python3.9 | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43882
| | python3.9 | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| | python3.9-minimal | CVE-2021-29921 | CRITICAL | 3.9.2-1 | |
Expand...https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://linux.oracle.com/cve/CVE-2021-29921.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | python3.9-minimal | CVE-2021-3426 | MEDIUM | 3.9.2-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
https://github.com/python/cpython/pull/24285
https://github.com/python/cpython/pull/24337
https://linux.oracle.com/cve/CVE-2021-3426.html
https://linux.oracle.com/errata/ELSA-2021-9562.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210629-0003/
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | python3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
| | python3.9-minimal | CVE-2021-3737 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2021-4160.html
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
| | python3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| -| python3.9-minimal | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...
| +| python3.9-minimal | CVE-2022-0391 | MEDIUM | 3.9.2-1 | |
Expand...https://bugs.python.org/issue43882
| | python3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 | |
Expand...https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
| | sudo | CVE-2005-1119 | LOW | 1.9.5p2-3 | |
Expand...http://www.securityfocus.com/bid/13171
| | tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| @@ -337,12 +339,12 @@ hide: | vim-common | CVE-2022-0361 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
| | vim-common | CVE-2022-0368 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
| | vim-common | CVE-2022-0392 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
| -| vim-common | CVE-2022-0393 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
| +| vim-common | CVE-2022-0393 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| | vim-common | CVE-2022-0407 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
| -| vim-common | CVE-2022-0408 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
| -| vim-common | CVE-2022-0413 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
| -| vim-common | CVE-2022-0417 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
| -| vim-common | CVE-2022-0443 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
| +| vim-common | CVE-2022-0408 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0413 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0417 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-common | CVE-2022-0443 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| | vim-common | CVE-2021-4193 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
| | vim-common | CVE-2022-0156 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
| | vim-common | CVE-2022-0213 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
| @@ -350,6 +352,8 @@ hide: | vim-common | CVE-2008-4677 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| | vim-common | CVE-2017-1000382 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| | vim-common | CVE-2022-0158 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
| +| vim-common | CVE-2022-0554 | UNKNOWN | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
| +| vim-common | CVE-2022-0572 | UNKNOWN | 2:8.2.2434-3+deb11u1 | |
Expand...
| | vim-tiny | CVE-2022-0318 | CRITICAL | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
| | vim-tiny | CVE-2021-3872 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| | vim-tiny | CVE-2021-3903 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| @@ -372,12 +376,12 @@ hide: | vim-tiny | CVE-2022-0361 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
| | vim-tiny | CVE-2022-0368 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
| | vim-tiny | CVE-2022-0392 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
| -| vim-tiny | CVE-2022-0393 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
| +| vim-tiny | CVE-2022-0393 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| | vim-tiny | CVE-2022-0407 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
| -| vim-tiny | CVE-2022-0408 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
| -| vim-tiny | CVE-2022-0413 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
| -| vim-tiny | CVE-2022-0417 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
| -| vim-tiny | CVE-2022-0443 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
| +| vim-tiny | CVE-2022-0408 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-tiny | CVE-2022-0413 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-tiny | CVE-2022-0417 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| vim-tiny | CVE-2022-0443 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| | vim-tiny | CVE-2021-4193 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
| | vim-tiny | CVE-2022-0156 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
| | vim-tiny | CVE-2022-0213 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
| @@ -385,6 +389,8 @@ hide: | vim-tiny | CVE-2008-4677 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| | vim-tiny | CVE-2017-1000382 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| | vim-tiny | CVE-2022-0158 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
| +| vim-tiny | CVE-2022-0554 | UNKNOWN | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
| +| vim-tiny | CVE-2022-0572 | UNKNOWN | 2:8.2.2434-3+deb11u1 | |
Expand...
| | xxd | CVE-2022-0318 | CRITICAL | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
| | xxd | CVE-2021-3872 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://ubuntu.com/security/notices/USN-5147-1
| | xxd | CVE-2021-3903 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://ubuntu.com/security/notices/USN-5147-1
| @@ -407,12 +413,12 @@ hide: | xxd | CVE-2022-0361 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366 (v8.2.4215)
https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
| | xxd | CVE-2022-0368 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217)
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/
| | xxd | CVE-2022-0392 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
| -| xxd | CVE-2022-0393 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
| +| xxd | CVE-2022-0393 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| | xxd | CVE-2022-0407 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
| -| xxd | CVE-2022-0408 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
| -| xxd | CVE-2022-0413 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
| -| xxd | CVE-2022-0417 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
| -| xxd | CVE-2022-0443 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
| +| xxd | CVE-2022-0408 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0413 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0417 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| +| xxd | CVE-2022-0443 | HIGH | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFXFAILMLUIK4MBUEZO4HNBNKYZRJ5AP/
| | xxd | CVE-2021-4193 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
| | xxd | CVE-2022-0156 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
| | xxd | CVE-2022-0213 | MEDIUM | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
| @@ -420,6 +426,10 @@ hide: | xxd | CVE-2008-4677 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| | xxd | CVE-2017-1000382 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| | xxd | CVE-2022-0158 | LOW | 2:8.2.2434-3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HD5S2FC2HF22A7XQXK2XXIR46EARVWIM/
| +| xxd | CVE-2022-0554 | UNKNOWN | 2:8.2.2434-3+deb11u1 | |
Expand...https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
| +| xxd | CVE-2022-0572 | UNKNOWN | 2:8.2.2434-3+deb11u1 | |
Expand...
| +| zsh | CVE-2021-45444 | UNKNOWN | 5.8-6 | |
Expand...
| +| zsh-common | CVE-2021-45444 | UNKNOWN | 5.8-6 | |
Expand...
| **gobinary** @@ -433,7 +443,7 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| gopkg.in/yaml.v2 | CVE-2019-11254 | MEDIUM | v2.2.1 | 2.2.8 |
Expand...https://github.com/kubernetes/kubernetes/issues/89535
https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
https://groups.google.com/forum/#!topic/kubernetes-security-announce/wuwEwZigXBc
https://linux.oracle.com/cve/CVE-2019-11254.html
https://linux.oracle.com/errata/ELSA-2020-5653.html
https://security.netapp.com/advisory/ntap-20200413-0003/
| +| gopkg.in/yaml.v2 | CVE-2019-11254 | MEDIUM | v2.2.1 | 2.2.8 |
Expand...https://github.com/advisories/GHSA-wxc4-f4m6-wwqv
https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48
https://github.com/kubernetes/kubernetes/issues/89535
https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8
https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
https://groups.google.com/forum/#!topic/kubernetes-security-announce/wuwEwZigXBc
https://linux.oracle.com/cve/CVE-2019-11254.html
https://linux.oracle.com/errata/ELSA-2020-5653.html
https://nvd.nist.gov/vuln/detail/CVE-2019-11254
https://security.netapp.com/advisory/ntap-20200413-0003/
| | gopkg.in/yaml.v2 | GMS-2019-2 | UNKNOWN | v2.2.1 | v2.2.3 |
Expand...https://github.com/docker/cli/pull/2117
| | gopkg.in/yaml.v2 | GO-2021-0061 | UNKNOWN | v2.2.1 | 2.2.3 |
Expand...
| diff --git a/stable/code-server/2.1.24/templates/common.yaml b/stable/code-server/2.1.25/templates/common.yaml similarity index 100% rename from stable/code-server/2.1.24/templates/common.yaml rename to stable/code-server/2.1.25/templates/common.yaml diff --git a/stable/code-server/2.1.24/values.yaml b/stable/code-server/2.1.25/values.yaml similarity index 100% rename from stable/code-server/2.1.24/values.yaml rename to stable/code-server/2.1.25/values.yaml diff --git a/stable/filezilla/2.0.39/Chart.lock b/stable/filezilla/2.0.39/Chart.lock deleted file mode 100644 index 7551d703746..00000000000 --- a/stable/filezilla/2.0.39/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-08T16:38:01.978438323Z" diff --git a/stable/filezilla/2.0.39/CHANGELOG.md b/stable/filezilla/2.0.41/CHANGELOG.md similarity index 91% rename from stable/filezilla/2.0.39/CHANGELOG.md rename to stable/filezilla/2.0.41/CHANGELOG.md index d8a5f3c4eee..34703546e23 100644 --- a/stable/filezilla/2.0.39/CHANGELOG.md +++ b/stable/filezilla/2.0.41/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [filezilla-2.0.41](https://github.com/truecharts/apps/compare/filezilla-2.0.40...filezilla-2.0.41) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [filezilla-2.0.39](https://github.com/truecharts/apps/compare/filezilla-2.0.38...filezilla-2.0.39) (2022-02-08) @@ -88,12 +97,3 @@ * expose capabilities in GUI ([#1709](https://github.com/truecharts/apps/issues/1709)) - - - -### [filezilla-2.0.30](https://github.com/truecharts/apps/compare/filezilla-2.0.29...filezilla-2.0.30) (2022-01-12) - -#### Chore - -* update helm general non-major helm releases ([#1704](https://github.com/truecharts/apps/issues/1704)) - diff --git a/stable/filezilla/2.0.39/CONFIG.md b/stable/filezilla/2.0.41/CONFIG.md similarity index 100% rename from stable/filezilla/2.0.39/CONFIG.md rename to stable/filezilla/2.0.41/CONFIG.md diff --git a/stable/filezilla/2.0.41/Chart.lock b/stable/filezilla/2.0.41/Chart.lock new file mode 100644 index 00000000000..63ff9a43732 --- /dev/null +++ b/stable/filezilla/2.0.41/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:44:32.432692613Z" diff --git a/stable/filezilla/2.0.39/Chart.yaml b/stable/filezilla/2.0.41/Chart.yaml similarity index 94% rename from stable/filezilla/2.0.39/Chart.yaml rename to stable/filezilla/2.0.41/Chart.yaml index 2f957db21e7..4d5ca31e32e 100644 --- a/stable/filezilla/2.0.39/Chart.yaml +++ b/stable/filezilla/2.0.41/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "3.51.0" +appVersion: "3.55.1" dependencies: - name: common repository: https://truecharts.org @@ -23,7 +23,7 @@ sources: - https://filezilla-project.org/ - https://github.com/linuxserver/docker-filezilla type: application -version: 2.0.39 +version: 2.0.41 annotations: truecharts.org/catagories: | - media diff --git a/stable/filezilla/2.0.39/README.md b/stable/filezilla/2.0.41/README.md similarity index 100% rename from stable/filezilla/2.0.39/README.md rename to stable/filezilla/2.0.41/README.md diff --git a/stable/filezilla/2.0.39/app-readme.md b/stable/filezilla/2.0.41/app-readme.md similarity index 100% rename from stable/filezilla/2.0.39/app-readme.md rename to stable/filezilla/2.0.41/app-readme.md diff --git a/stable/filezilla/2.0.39/charts/common-8.15.2.tgz b/stable/filezilla/2.0.41/charts/common-8.15.2.tgz similarity index 100% rename from stable/filezilla/2.0.39/charts/common-8.15.2.tgz rename to stable/filezilla/2.0.41/charts/common-8.15.2.tgz diff --git a/stable/filezilla/2.0.39/helm-values.md b/stable/filezilla/2.0.41/helm-values.md similarity index 91% rename from stable/filezilla/2.0.39/helm-values.md rename to stable/filezilla/2.0.41/helm-values.md index f9172f8540a..a297937c8d8 100644 --- a/stable/filezilla/2.0.39/helm-values.md +++ b/stable/filezilla/2.0.41/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env.PUID | int | `568` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/filezilla"` | | -| image.tag | string | `"version-3.51.0-r1@sha256:92421eae5b47e6e98d5157db3f6a453ab0d7733a693b5e8724edeef4090593eb"` | | +| image.tag | string | `"v3.55.1@sha256:46fb9508d7b15e833095d8a9a02d7d516fcee336caf4a20ee4b1d9b40e76d2eb"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | persistence.varrun.enabled | bool | `true` | | diff --git a/stable/filezilla/2.0.39/ix_values.yaml b/stable/filezilla/2.0.41/ix_values.yaml similarity index 80% rename from stable/filezilla/2.0.39/ix_values.yaml rename to stable/filezilla/2.0.41/ix_values.yaml index afba5488733..0f7e3ded071 100644 --- a/stable/filezilla/2.0.39/ix_values.yaml +++ b/stable/filezilla/2.0.41/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/filezilla pullPolicy: IfNotPresent - tag: version-3.51.0-r1@sha256:92421eae5b47e6e98d5157db3f6a453ab0d7733a693b5e8724edeef4090593eb + tag: v3.55.1@sha256:46fb9508d7b15e833095d8a9a02d7d516fcee336caf4a20ee4b1d9b40e76d2eb env: PUID: 568 diff --git a/stable/filezilla/2.0.39/questions.yaml b/stable/filezilla/2.0.41/questions.yaml similarity index 100% rename from stable/filezilla/2.0.39/questions.yaml rename to stable/filezilla/2.0.41/questions.yaml diff --git a/stable/filezilla/2.0.39/security.md b/stable/filezilla/2.0.41/security.md similarity index 90% rename from stable/filezilla/2.0.39/security.md rename to stable/filezilla/2.0.41/security.md index 36a2c770123..7233bca5312 100644 --- a/stable/filezilla/2.0.39/security.md +++ b/stable/filezilla/2.0.41/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/filezilla:version-3.51.0-r1@sha256:92421eae5b47e6e98d5157db3f6a453ab0d7733a693b5e8724edeef4090593eb + tccr.io/truecharts/filezilla:v3.55.1@sha256:46fb9508d7b15e833095d8a9a02d7d516fcee336caf4a20ee4b1d9b40e76d2eb ##### Scan Results @@ -122,15 +122,48 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| ansi-regex | CVE-2021-3807 | HIGH | 3.0.0 | 5.0.1, 6.0.1 |
Expand...https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://github.com/advisories/GHSA-93q8-gq69-wqmw
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-0350.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
| | deep-extend | CVE-2018-3750 | CRITICAL | 0.4.2 | 0.5.1 |
Expand...https://github.com/advisories/GHSA-hr2v-3952-633q
https://hackerone.com/reports/311333
https://nodesecurity.io/advisories/612
https://nvd.nist.gov/vuln/detail/CVE-2018-3750
https://www.npmjs.com/advisories/612
| | deep-extend | NSWG-ECO-408 | LOW | 0.4.2 | >=0.5.1 |
Expand...https://hackerone.com/reports/311333
| -| engine.io | CVE-2022-21676 | HIGH | 4.1.1 | 6.1.1, 5.2.1, 4.1.2 |
Expand...https://github.com/advisories/GHSA-273r-mgr4-v34f
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
https://github.com/socketio/engine.io/releases/tag/4.1.2
https://github.com/socketio/engine.io/releases/tag/5.2.1
https://github.com/socketio/engine.io/releases/tag/6.1.1
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
https://nvd.nist.gov/vuln/detail/CVE-2022-21676
| -| engine.io | CVE-2022-21676 | HIGH | 5.2.0 | 6.1.1, 5.2.1, 4.1.2 |
Expand...https://github.com/advisories/GHSA-273r-mgr4-v34f
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
https://github.com/socketio/engine.io/releases/tag/4.1.2
https://github.com/socketio/engine.io/releases/tag/5.2.1
https://github.com/socketio/engine.io/releases/tag/6.1.1
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
https://nvd.nist.gov/vuln/detail/CVE-2022-21676
| -| markdown-it | CVE-2022-21670 | MEDIUM | 12.2.0 | 12.3.2 |
Expand...https://github.com/advisories/GHSA-6vfc-qv3f-vr6c
https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101
https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c
https://nvd.nist.gov/vuln/detail/CVE-2022-21670
| -| node-fetch | CVE-2022-0235 | MEDIUM | 2.6.2 | 2.6.7, 3.1.1 |
Expand...https://github.com/advisories/GHSA-r683-j2x4-v87g
https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10
https://github.com/node-fetch/node-fetch/pull/1453
https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7
https://nvd.nist.gov/vuln/detail/CVE-2022-0235
| -| postcss | CVE-2021-23382 | MEDIUM | 7.0.36 | 8.2.13 |
Expand...https://github.com/advisories/GHSA-566m-qj78-rww5
https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956
https://nvd.nist.gov/vuln/detail/CVE-2021-23382
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641
https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640
| -| simple-get | CVE-2022-0355 | HIGH | 3.1.0 | 2.8.2, 3.1.1, 4.0.1 |
Expand...https://github.com/advisories/GHSA-wpg7-2c88-r8xv
https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f
https://github.com/feross/simple-get/pull/75#issuecomment-1027755026
https://github.com/feross/simple-get/pull/76#issuecomment-1027754710
https://huntr.dev/bounties/42c79c23-6646-46c4-871d-219c0d4b4e31
https://nvd.nist.gov/vuln/detail/CVE-2022-0355
| + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.2 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.4 | 0.3.7 |
Expand...
| + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| No Vulnerabilities found | +|:---------------------------------| + + + +**gobinary** + + +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.2 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| +| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.4 | 0.3.7 |
Expand...
| **gobinary** diff --git a/stable/filezilla/2.0.39/templates/common.yaml b/stable/filezilla/2.0.41/templates/common.yaml similarity index 100% rename from stable/filezilla/2.0.39/templates/common.yaml rename to stable/filezilla/2.0.41/templates/common.yaml diff --git a/stable/filezilla/2.0.39/values.yaml b/stable/filezilla/2.0.41/values.yaml similarity index 100% rename from stable/filezilla/2.0.39/values.yaml rename to stable/filezilla/2.0.41/values.yaml diff --git a/stable/grafana/2.0.40/Chart.lock b/stable/grafana/2.0.40/Chart.lock deleted file mode 100644 index 95ced557e57..00000000000 --- a/stable/grafana/2.0.40/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-10T16:19:17.788270503Z" diff --git a/stable/grafana/2.0.40/CHANGELOG.md b/stable/grafana/2.0.41/CHANGELOG.md similarity index 91% rename from stable/grafana/2.0.40/CHANGELOG.md rename to stable/grafana/2.0.41/CHANGELOG.md index d1f520eb14a..15c0f30d4fd 100644 --- a/stable/grafana/2.0.40/CHANGELOG.md +++ b/stable/grafana/2.0.41/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grafana-2.0.41](https://github.com/truecharts/apps/compare/grafana-2.0.40...grafana-2.0.41) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [grafana-2.0.40](https://github.com/truecharts/apps/compare/grafana-2.0.39...grafana-2.0.40) (2022-02-10) @@ -88,12 +97,3 @@ ### [grafana-2.0.31](https://github.com/truecharts/apps/compare/grafana-2.0.30...grafana-2.0.31) (2022-01-24) #### Chore - -* update docker general non-major ([#1786](https://github.com/truecharts/apps/issues/1786)) - - - - -### [grafana-2.0.30](https://github.com/truecharts/apps/compare/grafana-2.0.29...grafana-2.0.30) (2022-01-22) - -#### Chore diff --git a/stable/grafana/2.0.40/CONFIG.md b/stable/grafana/2.0.41/CONFIG.md similarity index 100% rename from stable/grafana/2.0.40/CONFIG.md rename to stable/grafana/2.0.41/CONFIG.md diff --git a/dependency/mariadb/1.0.69/Chart.lock b/stable/grafana/2.0.41/Chart.lock similarity index 79% rename from dependency/mariadb/1.0.69/Chart.lock rename to stable/grafana/2.0.41/Chart.lock index 7ed566aad5d..db5b0b262f4 100644 --- a/dependency/mariadb/1.0.69/Chart.lock +++ b/stable/grafana/2.0.41/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.15.2 digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-10T16:17:20.07495889Z" +generated: "2022-02-14T11:44:35.38232983Z" diff --git a/stable/grafana/2.0.40/Chart.yaml b/stable/grafana/2.0.41/Chart.yaml similarity index 98% rename from stable/grafana/2.0.40/Chart.yaml rename to stable/grafana/2.0.41/Chart.yaml index 644a6ad7244..b03e4edb55e 100644 --- a/stable/grafana/2.0.40/Chart.yaml +++ b/stable/grafana/2.0.41/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/bitnami/bitnami-docker-grafana - https://grafana.com/ type: application -version: 2.0.40 +version: 2.0.41 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/grafana/2.0.40/README.md b/stable/grafana/2.0.41/README.md similarity index 100% rename from stable/grafana/2.0.40/README.md rename to stable/grafana/2.0.41/README.md diff --git a/stable/grafana/2.0.40/app-readme.md b/stable/grafana/2.0.41/app-readme.md similarity index 100% rename from stable/grafana/2.0.40/app-readme.md rename to stable/grafana/2.0.41/app-readme.md diff --git a/stable/grafana/2.0.40/charts/common-8.15.2.tgz b/stable/grafana/2.0.41/charts/common-8.15.2.tgz similarity index 100% rename from stable/grafana/2.0.40/charts/common-8.15.2.tgz rename to stable/grafana/2.0.41/charts/common-8.15.2.tgz diff --git a/stable/grafana/2.0.40/helm-values.md b/stable/grafana/2.0.41/helm-values.md similarity index 95% rename from stable/grafana/2.0.40/helm-values.md rename to stable/grafana/2.0.41/helm-values.md index c1c48ad42e7..b7ada7fbfe6 100644 --- a/stable/grafana/2.0.40/helm-values.md +++ b/stable/grafana/2.0.41/helm-values.md @@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here | env.GF_PATHS_PROVISIONING | string | `"/opt/bitnami/grafana/conf/provisioning"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/grafana"` | | -| image.tag | string | `"v8.3.6@sha256:9b54ff414395398c9554e341fe3025c03d9efb35d378955762299c0e536c0560"` | | +| image.tag | string | `"v8.3.6@sha256:a6224cd92ecd4353c4fe7b018148ed9f2796f232aeb908ef74a3fe3cee0a42a9"` | | | metrics.enabled | bool | See values.yaml | Enable and configure a Prometheus serviceMonitor for the chart under this key. | | metrics.prometheusRule | object | See values.yaml | Enable and configure Prometheus Rules for the chart under this key. | | metrics.prometheusRule.rules | list | See prometheusrules.yaml | Configure additionial rules for the chart under this key. | diff --git a/stable/grafana/2.0.40/ix_values.yaml b/stable/grafana/2.0.41/ix_values.yaml similarity index 95% rename from stable/grafana/2.0.40/ix_values.yaml rename to stable/grafana/2.0.41/ix_values.yaml index 7aad3170eb4..c42af08c6d1 100644 --- a/stable/grafana/2.0.40/ix_values.yaml +++ b/stable/grafana/2.0.41/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/grafana pullPolicy: IfNotPresent - tag: v8.3.6@sha256:9b54ff414395398c9554e341fe3025c03d9efb35d378955762299c0e536c0560 + tag: v8.3.6@sha256:a6224cd92ecd4353c4fe7b018148ed9f2796f232aeb908ef74a3fe3cee0a42a9 securityContext: readOnlyRootFilesystem: false diff --git a/stable/grafana/2.0.40/questions.yaml b/stable/grafana/2.0.41/questions.yaml similarity index 100% rename from stable/grafana/2.0.40/questions.yaml rename to stable/grafana/2.0.41/questions.yaml diff --git a/stable/grafana/2.0.40/security.md b/stable/grafana/2.0.41/security.md similarity index 97% rename from stable/grafana/2.0.40/security.md rename to stable/grafana/2.0.41/security.md index d4b9d16d1aa..2bdcc80d6a5 100644 --- a/stable/grafana/2.0.40/security.md +++ b/stable/grafana/2.0.41/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/grafana:v8.3.6@sha256:9b54ff414395398c9554e341fe3025c03d9efb35d378955762299c0e536c0560 + tccr.io/truecharts/grafana:v8.3.6@sha256:a6224cd92ecd4353c4fe7b018148ed9f2796f232aeb908ef74a3fe3cee0a42a9 ##### Scan Results @@ -113,7 +113,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/grafana:v8.3.6@sha256:9b54ff414395398c9554e341fe3025c03d9efb35d378955762299c0e536c0560 (debian 10.11) +#### Container: tccr.io/truecharts/grafana:v8.3.6@sha256:a6224cd92ecd4353c4fe7b018148ed9f2796f232aeb908ef74a3fe3cee0a42a9 (debian 10.11) **debian** @@ -190,17 +190,7 @@ hide: | libcurl4 | CVE-2021-22922 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22923 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22924 | LOW | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.6-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.6-2+deb10u1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2021-45960 | HIGH | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://security.netapp.com/advisory/ntap-20220121-0004/
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2021-46143 | HIGH | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://security.netapp.com/advisory/ntap-20220121-0006/
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22825 | HIGH | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22826 | HIGH | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22827 | HIGH | 2.2.6-2+deb10u1 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u1 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| +| libexpat1 | CVE-2013-0340 | LOW | 2.2.6-2+deb10u2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| | libfdisk1 | CVE-2021-37600 | LOW | 2.33.1-0.1 | |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| | libgcc1 | CVE-2018-12886 | HIGH | 8.3.0-6 | |
Expand...https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
https://www.gnu.org/software/gcc/gcc-8/changes.html
| | libgcc1 | CVE-2019-15847 | HIGH | 8.3.0-6 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481
https://linux.oracle.com/cve/CVE-2019-15847.html
https://linux.oracle.com/errata/ELSA-2020-1864.html
| @@ -294,10 +284,9 @@ hide: **gobinary** -| No Vulnerabilities found | -|:---------------------------------| - - +| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | +|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| +| github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| **gobinary** diff --git a/stable/grafana/2.0.40/templates/common.yaml b/stable/grafana/2.0.41/templates/common.yaml similarity index 100% rename from stable/grafana/2.0.40/templates/common.yaml rename to stable/grafana/2.0.41/templates/common.yaml diff --git a/stable/grafana/2.0.40/templates/prometheusrules.yaml b/stable/grafana/2.0.41/templates/prometheusrules.yaml similarity index 100% rename from stable/grafana/2.0.40/templates/prometheusrules.yaml rename to stable/grafana/2.0.41/templates/prometheusrules.yaml diff --git a/stable/grafana/2.0.40/templates/servicemonitor.yaml b/stable/grafana/2.0.41/templates/servicemonitor.yaml similarity index 100% rename from stable/grafana/2.0.40/templates/servicemonitor.yaml rename to stable/grafana/2.0.41/templates/servicemonitor.yaml diff --git a/stable/grafana/2.0.40/values.yaml b/stable/grafana/2.0.41/values.yaml similarity index 100% rename from stable/grafana/2.0.40/values.yaml rename to stable/grafana/2.0.41/values.yaml diff --git a/stable/grocy/9.0.44/Chart.lock b/stable/grocy/9.0.44/Chart.lock deleted file mode 100644 index 9769cbb39e7..00000000000 --- a/stable/grocy/9.0.44/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-10T16:19:26.966980739Z" diff --git a/stable/grocy/9.0.44/CHANGELOG.md b/stable/grocy/9.0.45/CHANGELOG.md similarity index 91% rename from stable/grocy/9.0.44/CHANGELOG.md rename to stable/grocy/9.0.45/CHANGELOG.md index 72d9791230c..7be616ba207 100644 --- a/stable/grocy/9.0.44/CHANGELOG.md +++ b/stable/grocy/9.0.45/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grocy-9.0.45](https://github.com/truecharts/apps/compare/grocy-9.0.44...grocy-9.0.45) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [grocy-9.0.44](https://github.com/truecharts/apps/compare/grocy-9.0.43...grocy-9.0.44) (2022-02-10) @@ -88,12 +97,3 @@ #### Chore * update helm general non-major helm releases ([#1759](https://github.com/truecharts/apps/issues/1759)) - - - - -### [grocy-9.0.34](https://github.com/truecharts/apps/compare/grocy-9.0.33...grocy-9.0.34) (2022-01-21) - -#### Chore - -* update docker general non-major ([#1751](https://github.com/truecharts/apps/issues/1751)) diff --git a/stable/grocy/9.0.44/CONFIG.md b/stable/grocy/9.0.45/CONFIG.md similarity index 100% rename from stable/grocy/9.0.44/CONFIG.md rename to stable/grocy/9.0.45/CONFIG.md diff --git a/stable/grocy/9.0.45/Chart.lock b/stable/grocy/9.0.45/Chart.lock new file mode 100644 index 00000000000..e70739a5f00 --- /dev/null +++ b/stable/grocy/9.0.45/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:44:46.154222099Z" diff --git a/stable/grocy/9.0.44/Chart.yaml b/stable/grocy/9.0.45/Chart.yaml similarity index 97% rename from stable/grocy/9.0.44/Chart.yaml rename to stable/grocy/9.0.45/Chart.yaml index 37e0f00876a..7b22aa401e3 100644 --- a/stable/grocy/9.0.44/Chart.yaml +++ b/stable/grocy/9.0.45/Chart.yaml @@ -20,7 +20,7 @@ name: grocy sources: - https://github.com/grocy/grocy type: application -version: 9.0.44 +version: 9.0.45 annotations: truecharts.org/catagories: | - Home-Automation diff --git a/stable/grocy/9.0.44/README.md b/stable/grocy/9.0.45/README.md similarity index 100% rename from stable/grocy/9.0.44/README.md rename to stable/grocy/9.0.45/README.md diff --git a/stable/grocy/9.0.44/app-readme.md b/stable/grocy/9.0.45/app-readme.md similarity index 100% rename from stable/grocy/9.0.44/app-readme.md rename to stable/grocy/9.0.45/app-readme.md diff --git a/stable/grocy/9.0.44/charts/common-8.15.2.tgz b/stable/grocy/9.0.45/charts/common-8.15.2.tgz similarity index 100% rename from stable/grocy/9.0.44/charts/common-8.15.2.tgz rename to stable/grocy/9.0.45/charts/common-8.15.2.tgz diff --git a/stable/grocy/9.0.44/helm-values.md b/stable/grocy/9.0.45/helm-values.md similarity index 92% rename from stable/grocy/9.0.44/helm-values.md rename to stable/grocy/9.0.45/helm-values.md index 3e723920d7d..d2a78fa8482 100644 --- a/stable/grocy/9.0.44/helm-values.md +++ b/stable/grocy/9.0.45/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/grocy"` | | -| image.tag | string | `"v3.1.3@sha256:ad30295243f283972db60b3977918480ac13e5fa3f109f27ba10d79cc49f61ea"` | | +| image.tag | string | `"v3.1.3@sha256:9750ab21b7a000b82ffc26b9a434b8159a72b865d26b3614909deab1e6fe3ce0"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | podSecurityContext.runAsGroup | int | `0` | | diff --git a/stable/grocy/9.0.44/ix_values.yaml b/stable/grocy/9.0.45/ix_values.yaml similarity index 81% rename from stable/grocy/9.0.44/ix_values.yaml rename to stable/grocy/9.0.45/ix_values.yaml index 93e85eb4278..6797628c6ac 100644 --- a/stable/grocy/9.0.44/ix_values.yaml +++ b/stable/grocy/9.0.45/ix_values.yaml @@ -1,6 +1,6 @@ image: repository: tccr.io/truecharts/grocy - tag: v3.1.3@sha256:ad30295243f283972db60b3977918480ac13e5fa3f109f27ba10d79cc49f61ea + tag: v3.1.3@sha256:9750ab21b7a000b82ffc26b9a434b8159a72b865d26b3614909deab1e6fe3ce0 pullPolicy: IfNotPresent securityContext: diff --git a/stable/grocy/9.0.44/questions.yaml b/stable/grocy/9.0.45/questions.yaml similarity index 100% rename from stable/grocy/9.0.44/questions.yaml rename to stable/grocy/9.0.45/questions.yaml diff --git a/stable/grocy/9.0.44/security.md b/stable/grocy/9.0.45/security.md similarity index 99% rename from stable/grocy/9.0.44/security.md rename to stable/grocy/9.0.45/security.md index a400df855a0..f82b4b48693 100644 --- a/stable/grocy/9.0.44/security.md +++ b/stable/grocy/9.0.45/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/grocy:v3.1.3@sha256:ad30295243f283972db60b3977918480ac13e5fa3f109f27ba10d79cc49f61ea + tccr.io/truecharts/grocy:v3.1.3@sha256:9750ab21b7a000b82ffc26b9a434b8159a72b865d26b3614909deab1e6fe3ce0 ##### Scan Results @@ -140,5 +140,5 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| illuminate/view | CVE-2021-43808 | MEDIUM | v8.70.2 | 7.30.6, 8.75.0, 6.20.42 |
Expand...https://github.com/advisories/GHSA-66hf-2p6w-jqfw
https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b
https://github.com/laravel/framework/pull/39906
https://github.com/laravel/framework/pull/39908
https://github.com/laravel/framework/pull/39909
https://github.com/laravel/framework/releases/tag/v6.20.42
https://github.com/laravel/framework/releases/tag/v7.30.6
https://github.com/laravel/framework/releases/tag/v8.75.0
https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw
| +| illuminate/view | CVE-2021-43808 | MEDIUM | v8.70.2 | 8.75.0, 6.20.42, 7.30.6 |
Expand...https://github.com/advisories/GHSA-66hf-2p6w-jqfw
https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b
https://github.com/laravel/framework/pull/39906
https://github.com/laravel/framework/pull/39908
https://github.com/laravel/framework/pull/39909
https://github.com/laravel/framework/releases/tag/v6.20.42
https://github.com/laravel/framework/releases/tag/v7.30.6
https://github.com/laravel/framework/releases/tag/v8.75.0
https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw
| diff --git a/stable/grocy/9.0.44/templates/common.yaml b/stable/grocy/9.0.45/templates/common.yaml similarity index 100% rename from stable/grocy/9.0.44/templates/common.yaml rename to stable/grocy/9.0.45/templates/common.yaml diff --git a/stable/grocy/9.0.44/values.yaml b/stable/grocy/9.0.45/values.yaml similarity index 100% rename from stable/grocy/9.0.44/values.yaml rename to stable/grocy/9.0.45/values.yaml diff --git a/stable/lazylibrarian/9.0.55/Chart.lock b/stable/lazylibrarian/9.0.55/Chart.lock deleted file mode 100644 index c64da4a710d..00000000000 --- a/stable/lazylibrarian/9.0.55/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-10T16:20:35.695045319Z" diff --git a/stable/lazylibrarian/9.0.55/CHANGELOG.md b/stable/lazylibrarian/9.0.56/CHANGELOG.md similarity index 91% rename from stable/lazylibrarian/9.0.55/CHANGELOG.md rename to stable/lazylibrarian/9.0.56/CHANGELOG.md index 8ef0eaa7549..9f27fc50f86 100644 --- a/stable/lazylibrarian/9.0.55/CHANGELOG.md +++ b/stable/lazylibrarian/9.0.56/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [lazylibrarian-9.0.56](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.55...lazylibrarian-9.0.56) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [lazylibrarian-9.0.55](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.54...lazylibrarian-9.0.55) (2022-02-10) @@ -88,12 +97,3 @@ #### Chore -* update helm general non-major helm releases ([#1766](https://github.com/truecharts/apps/issues/1766)) - - - - -### [lazylibrarian-9.0.45](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.44...lazylibrarian-9.0.45) (2022-01-21) - -#### Chore - diff --git a/stable/lazylibrarian/9.0.55/CONFIG.md b/stable/lazylibrarian/9.0.56/CONFIG.md similarity index 100% rename from stable/lazylibrarian/9.0.55/CONFIG.md rename to stable/lazylibrarian/9.0.56/CONFIG.md diff --git a/stable/lazylibrarian/9.0.56/Chart.lock b/stable/lazylibrarian/9.0.56/Chart.lock new file mode 100644 index 00000000000..3ee2924e58a --- /dev/null +++ b/stable/lazylibrarian/9.0.56/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:45:06.852297766Z" diff --git a/stable/lazylibrarian/9.0.55/Chart.yaml b/stable/lazylibrarian/9.0.56/Chart.yaml similarity index 97% rename from stable/lazylibrarian/9.0.55/Chart.yaml rename to stable/lazylibrarian/9.0.56/Chart.yaml index 77294ee9626..e9a1f138431 100644 --- a/stable/lazylibrarian/9.0.55/Chart.yaml +++ b/stable/lazylibrarian/9.0.56/Chart.yaml @@ -21,7 +21,7 @@ sources: - https://gitlab.com/LazyLibrarian/LazyLibrarian.git - https://lazylibrarian.gitlab.io type: application -version: 9.0.55 +version: 9.0.56 annotations: truecharts.org/catagories: | - media diff --git a/stable/lazylibrarian/9.0.55/README.md b/stable/lazylibrarian/9.0.56/README.md similarity index 100% rename from stable/lazylibrarian/9.0.55/README.md rename to stable/lazylibrarian/9.0.56/README.md diff --git a/stable/lazylibrarian/9.0.55/app-readme.md b/stable/lazylibrarian/9.0.56/app-readme.md similarity index 100% rename from stable/lazylibrarian/9.0.55/app-readme.md rename to stable/lazylibrarian/9.0.56/app-readme.md diff --git a/stable/lazylibrarian/9.0.55/charts/common-8.15.2.tgz b/stable/lazylibrarian/9.0.56/charts/common-8.15.2.tgz similarity index 100% rename from stable/lazylibrarian/9.0.55/charts/common-8.15.2.tgz rename to stable/lazylibrarian/9.0.56/charts/common-8.15.2.tgz diff --git a/stable/lazylibrarian/9.0.55/helm-values.md b/stable/lazylibrarian/9.0.56/helm-values.md similarity index 92% rename from stable/lazylibrarian/9.0.55/helm-values.md rename to stable/lazylibrarian/9.0.56/helm-values.md index 8b9d29e94f4..3554536f7df 100644 --- a/stable/lazylibrarian/9.0.55/helm-values.md +++ b/stable/lazylibrarian/9.0.56/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/lazylibrarian"` | | -| image.tag | string | `"latest@sha256:48375e52886cdf4ecf020d4ec3f8e3ce140bd179866e715d1eb740fecc9a1f6a"` | | +| image.tag | string | `"latest@sha256:c617ab5967447e3eda159dc7a6ff0f0ab544d530df5756a01c9645b2edb65bc7"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | persistence.varrun.enabled | bool | `true` | | diff --git a/stable/lazylibrarian/9.0.55/ix_values.yaml b/stable/lazylibrarian/9.0.56/ix_values.yaml similarity index 81% rename from stable/lazylibrarian/9.0.55/ix_values.yaml rename to stable/lazylibrarian/9.0.56/ix_values.yaml index 52c3c8b105f..524004f6fd0 100644 --- a/stable/lazylibrarian/9.0.55/ix_values.yaml +++ b/stable/lazylibrarian/9.0.56/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/lazylibrarian pullPolicy: IfNotPresent - tag: latest@sha256:48375e52886cdf4ecf020d4ec3f8e3ce140bd179866e715d1eb740fecc9a1f6a + tag: latest@sha256:c617ab5967447e3eda159dc7a6ff0f0ab544d530df5756a01c9645b2edb65bc7 securityContext: runAsNonRoot: false diff --git a/stable/lazylibrarian/9.0.55/questions.yaml b/stable/lazylibrarian/9.0.56/questions.yaml similarity index 100% rename from stable/lazylibrarian/9.0.55/questions.yaml rename to stable/lazylibrarian/9.0.56/questions.yaml diff --git a/stable/lazylibrarian/9.0.55/security.md b/stable/lazylibrarian/9.0.56/security.md similarity index 99% rename from stable/lazylibrarian/9.0.55/security.md rename to stable/lazylibrarian/9.0.56/security.md index 3fc8c91e0d2..0909c652cb5 100644 --- a/stable/lazylibrarian/9.0.55/security.md +++ b/stable/lazylibrarian/9.0.56/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/lazylibrarian:latest@sha256:48375e52886cdf4ecf020d4ec3f8e3ce140bd179866e715d1eb740fecc9a1f6a + tccr.io/truecharts/lazylibrarian:latest@sha256:c617ab5967447e3eda159dc7a6ff0f0ab544d530df5756a01c9645b2edb65bc7 ##### Scan Results @@ -113,7 +113,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/lazylibrarian:latest@sha256:48375e52886cdf4ecf020d4ec3f8e3ce140bd179866e715d1eb740fecc9a1f6a (ubuntu 18.04) +#### Container: tccr.io/truecharts/lazylibrarian:latest@sha256:c617ab5967447e3eda159dc7a6ff0f0ab544d530df5756a01c9645b2edb65bc7 (ubuntu 18.04) **ubuntu** @@ -141,8 +141,6 @@ hide: | libavahi-common3 | CVE-2021-26720 | LOW | 0.7-3.1ubuntu1.3 | |
Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824
https://bugzilla.suse.com/show_bug.cgi?id=1180827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720
https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog
https://packages.debian.org/bullseye/avahi-daemon
https://packages.debian.org/buster/avahi-daemon
https://packages.debian.org/sid/avahi-daemon
https://security-tracker.debian.org/tracker/CVE-2021-26720
https://www.openwall.com/lists/oss-security/2021/02/15/2
| | libc-bin | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | libc-bin | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| libc-bin | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| libc-bin | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc-bin | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | libc-bin | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | libc-bin | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -154,10 +152,10 @@ hide: | libc-bin | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libc-bin | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc-bin | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | libc6 | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| libc6 | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| libc6 | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | libc6 | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | libc6 | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -169,6 +167,8 @@ hide: | libc6 | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libc6 | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc6 | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc6 | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libcups2 | CVE-2019-8842 | LOW | 2.2.7-1ubuntu2.8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT210788
| | libcups2 | CVE-2020-10001 | LOW | 2.2.7-1ubuntu2.8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
https://linux.oracle.com/cve/CVE-2020-10001.html
https://linux.oracle.com/errata/ELSA-2021-4393.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00027.html
https://support.apple.com/en-us/HT212011
| | libcupsimage2 | CVE-2019-8842 | LOW | 2.2.7-1ubuntu2.8 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT210788
| @@ -253,8 +253,6 @@ hide: | libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | locales | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | locales | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| locales | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| locales | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | locales | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | locales | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | locales | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -266,11 +264,11 @@ hide: | locales | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | locales | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | locales | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | login | CVE-2013-4235 | LOW | 1:4.5-1ubuntu2.2 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | multiarch-support | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | multiarch-support | CVE-2021-3999 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| multiarch-support | CVE-2022-23218 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| multiarch-support | CVE-2022-23219 | MEDIUM | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | multiarch-support | CVE-2009-5155 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
| | multiarch-support | CVE-2015-8985 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
| | multiarch-support | CVE-2016-10228 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| @@ -282,6 +280,8 @@ hide: | multiarch-support | CVE-2021-3326 | LOW | 2.27-3ubuntu1.4 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | multiarch-support | CVE-2021-33574 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | multiarch-support | CVE-2021-35942 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| multiarch-support | CVE-2022-23218 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| multiarch-support | CVE-2022-23219 | LOW | 2.27-3ubuntu1.4 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | ncurses-base | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | ncurses-base | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| | ncurses-bin | CVE-2019-17594 | LOW | 6.1-1ubuntu1.18.04 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
| diff --git a/stable/lazylibrarian/9.0.55/templates/common.yaml b/stable/lazylibrarian/9.0.56/templates/common.yaml similarity index 100% rename from stable/lazylibrarian/9.0.55/templates/common.yaml rename to stable/lazylibrarian/9.0.56/templates/common.yaml diff --git a/stable/lazylibrarian/9.0.55/values.yaml b/stable/lazylibrarian/9.0.56/values.yaml similarity index 100% rename from stable/lazylibrarian/9.0.55/values.yaml rename to stable/lazylibrarian/9.0.56/values.yaml diff --git a/stable/librephotos/1.0.0/CHANGELOG.md b/stable/librephotos/1.0.1/CHANGELOG.md similarity index 71% rename from stable/librephotos/1.0.0/CHANGELOG.md rename to stable/librephotos/1.0.1/CHANGELOG.md index 28aefa2e4ef..18490a78f46 100644 --- a/stable/librephotos/1.0.0/CHANGELOG.md +++ b/stable/librephotos/1.0.1/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [librephotos-1.0.1](https://github.com/truecharts/apps/compare/librephotos-1.0.0...librephotos-1.0.1) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [librephotos-1.0.0](https://github.com/truecharts/apps/compare/librephotos-0.0.2...librephotos-1.0.0) (2022-02-14) diff --git a/stable/librephotos/1.0.0/CONFIG.md b/stable/librephotos/1.0.1/CONFIG.md similarity index 100% rename from stable/librephotos/1.0.0/CONFIG.md rename to stable/librephotos/1.0.1/CONFIG.md diff --git a/stable/librephotos/1.0.0/Chart.lock b/stable/librephotos/1.0.1/Chart.lock similarity index 87% rename from stable/librephotos/1.0.0/Chart.lock rename to stable/librephotos/1.0.1/Chart.lock index 60eae3a8d27..f6d0b97fd11 100644 --- a/stable/librephotos/1.0.0/Chart.lock +++ b/stable/librephotos/1.0.1/Chart.lock @@ -9,4 +9,4 @@ dependencies: repository: https://truecharts.org version: 1.0.71 digest: sha256:5e0ce1d5ef46d205e40745ce61638ba6eb10e0fb1c0b616bf465e877e39359df -generated: "2022-02-14T09:20:26.916288977Z" +generated: "2022-02-14T11:45:16.08304687Z" diff --git a/stable/librephotos/1.0.0/Chart.yaml b/stable/librephotos/1.0.1/Chart.yaml similarity index 96% rename from stable/librephotos/1.0.0/Chart.yaml rename to stable/librephotos/1.0.1/Chart.yaml index ac0772b298a..65b30c18f34 100644 --- a/stable/librephotos/1.0.0/Chart.yaml +++ b/stable/librephotos/1.0.1/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "2022w06" +appVersion: "2022w6" dependencies: - name: common repository: https://truecharts.org @@ -27,7 +27,7 @@ name: librephotos sources: - https://github.com/LibrePhotos/librephotos - https://hub.docker.com/r/reallibrephotos/librephotos -version: 1.0.0 +version: 1.0.1 annotations: truecharts.org/catagories: | - media diff --git a/stable/librephotos/1.0.0/README.md b/stable/librephotos/1.0.1/README.md similarity index 100% rename from stable/librephotos/1.0.0/README.md rename to stable/librephotos/1.0.1/README.md diff --git a/stable/librephotos/1.0.0/app-readme.md b/stable/librephotos/1.0.1/app-readme.md similarity index 100% rename from stable/librephotos/1.0.0/app-readme.md rename to stable/librephotos/1.0.1/app-readme.md diff --git a/stable/librephotos/1.0.0/charts/common-8.15.2.tgz b/stable/librephotos/1.0.1/charts/common-8.15.2.tgz similarity index 100% rename from stable/librephotos/1.0.0/charts/common-8.15.2.tgz rename to stable/librephotos/1.0.1/charts/common-8.15.2.tgz diff --git a/stable/librephotos/1.0.0/charts/postgresql-6.0.66.tgz b/stable/librephotos/1.0.1/charts/postgresql-6.0.66.tgz similarity index 100% rename from stable/librephotos/1.0.0/charts/postgresql-6.0.66.tgz rename to stable/librephotos/1.0.1/charts/postgresql-6.0.66.tgz diff --git a/stable/librephotos/1.0.0/charts/redis-1.0.71.tgz b/stable/librephotos/1.0.1/charts/redis-1.0.71.tgz similarity index 100% rename from stable/librephotos/1.0.0/charts/redis-1.0.71.tgz rename to stable/librephotos/1.0.1/charts/redis-1.0.71.tgz diff --git a/stable/librephotos/1.0.0/helm-values.md b/stable/librephotos/1.0.1/helm-values.md similarity index 93% rename from stable/librephotos/1.0.0/helm-values.md rename to stable/librephotos/1.0.1/helm-values.md index c2f7a7d7f84..737047baad3 100644 --- a/stable/librephotos/1.0.0/helm-values.md +++ b/stable/librephotos/1.0.1/helm-values.md @@ -47,10 +47,10 @@ You will, however, be able to use all values referenced in the common chart here | envValueFrom.SECRET_KEY.secretKeyRef.key | string | `"SECRET_KEY"` | | | envValueFrom.SECRET_KEY.secretKeyRef.name | string | `"librephotos-secrets"` | | | frontendImage.repository | string | `"tccr.io/truecharts/librephotos-frontend"` | | -| frontendImage.tag | string | `"v2022w06@sha256:9cb2cb4865197d460405fecd79bdd7808333443cb2089753825f7f97365a53a3"` | | +| frontendImage.tag | string | `"v2022w6@sha256:9cb2cb4865197d460405fecd79bdd7808333443cb2089753825f7f97365a53a3"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/librephotos-backend"` | | -| image.tag | string | `"v2022w06@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837"` | | +| image.tag | string | `"v2022w6@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837"` | | | persistence.cache.enabled | bool | `true` | | | persistence.cache.mountPath | string | `"/root/.cache"` | | | persistence.logs.enabled | bool | `true` | | @@ -69,7 +69,7 @@ You will, however, be able to use all values referenced in the common chart here | probes.readiness.path | string | `"/login"` | | | probes.startup.path | string | `"/login"` | | | proxyImage.repository | string | `"tccr.io/truecharts/librephotos-proxy"` | | -| proxyImage.tag | string | `"v2022w06@sha256:c147eaa3e96348e44132958ca871114a2ce240f0fa3604f738801317af09a160"` | | +| proxyImage.tag | string | `"v2022w6@sha256:c147eaa3e96348e44132958ca871114a2ce240f0fa3604f738801317af09a160"` | | | redis.enabled | bool | `true` | | | redis.existingSecret | string | `"rediscreds"` | | | redis.redisUsername | string | `"default"` | | diff --git a/stable/librephotos/1.0.0/ix_values.yaml b/stable/librephotos/1.0.1/ix_values.yaml similarity index 89% rename from stable/librephotos/1.0.0/ix_values.yaml rename to stable/librephotos/1.0.1/ix_values.yaml index 4b0ea890fcd..4b93ee59ddf 100644 --- a/stable/librephotos/1.0.0/ix_values.yaml +++ b/stable/librephotos/1.0.1/ix_values.yaml @@ -1,15 +1,15 @@ image: repository: tccr.io/truecharts/librephotos-backend - tag: v2022w06@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837 + tag: v2022w6@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837 pullPolicy: IfNotPresent frontendImage: repository: tccr.io/truecharts/librephotos-frontend - tag: v2022w06@sha256:9cb2cb4865197d460405fecd79bdd7808333443cb2089753825f7f97365a53a3 + tag: v2022w6@sha256:9cb2cb4865197d460405fecd79bdd7808333443cb2089753825f7f97365a53a3 proxyImage: repository: tccr.io/truecharts/librephotos-proxy - tag: v2022w06@sha256:c147eaa3e96348e44132958ca871114a2ce240f0fa3604f738801317af09a160 + tag: v2022w6@sha256:c147eaa3e96348e44132958ca871114a2ce240f0fa3604f738801317af09a160 securityContext: readOnlyRootFilesystem: false diff --git a/stable/librephotos/1.0.0/questions.yaml b/stable/librephotos/1.0.1/questions.yaml similarity index 100% rename from stable/librephotos/1.0.0/questions.yaml rename to stable/librephotos/1.0.1/questions.yaml diff --git a/stable/librephotos/1.0.0/security.md b/stable/librephotos/1.0.1/security.md similarity index 99% rename from stable/librephotos/1.0.0/security.md rename to stable/librephotos/1.0.1/security.md index c966cacfa44..4632866b8fc 100644 --- a/stable/librephotos/1.0.0/security.md +++ b/stable/librephotos/1.0.1/security.md @@ -119,9 +119,9 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:c0975b3bbd08e750d6514e38961a2fcfacce0ec2ddf764583dff2bd54a062609 - tccr.io/truecharts/librephotos-backend:v2022w06@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837 - - 'tccr.io/truecharts/librephotos-frontend:v2022w06@sha256:9cb2cb4865197d460405fecd79bdd7808333443cb2089753825f7f97365a53a3' - - 'tccr.io/truecharts/librephotos-proxy:v2022w06@sha256:c147eaa3e96348e44132958ca871114a2ce240f0fa3604f738801317af09a160' + tccr.io/truecharts/librephotos-backend:v2022w6@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837 + - 'tccr.io/truecharts/librephotos-frontend:v2022w6@sha256:9cb2cb4865197d460405fecd79bdd7808333443cb2089753825f7f97365a53a3' + - 'tccr.io/truecharts/librephotos-proxy:v2022w6@sha256:c147eaa3e96348e44132958ca871114a2ce240f0fa3604f738801317af09a160' tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:c0975b3bbd08e750d6514e38961a2fcfacce0ec2ddf764583dff2bd54a062609 @@ -431,7 +431,7 @@ hide: | github.com/opencontainers/runc | CVE-2021-43784 | MEDIUM | v1.0.1 | v1.0.3 |
Expand...https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554
https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae
https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f
https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43784
| -#### Container: tccr.io/truecharts/librephotos-backend:v2022w06@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837 (ubuntu 21.04) +#### Container: tccr.io/truecharts/librephotos-backend:v2022w6@sha256:4c24ce4ea5b340f83da0be0935eaea4ca525a15ed6da014f8ad8c709b377a837 (ubuntu 21.04) **ubuntu** diff --git a/stable/librephotos/1.0.0/templates/_secrets.tpl b/stable/librephotos/1.0.1/templates/_secrets.tpl similarity index 100% rename from stable/librephotos/1.0.0/templates/_secrets.tpl rename to stable/librephotos/1.0.1/templates/_secrets.tpl diff --git a/stable/librephotos/1.0.0/templates/common.yaml b/stable/librephotos/1.0.1/templates/common.yaml similarity index 100% rename from stable/librephotos/1.0.0/templates/common.yaml rename to stable/librephotos/1.0.1/templates/common.yaml diff --git a/stable/librephotos/1.0.0/templates/configmap.yaml b/stable/librephotos/1.0.1/templates/configmap.yaml similarity index 100% rename from stable/librephotos/1.0.0/templates/configmap.yaml rename to stable/librephotos/1.0.1/templates/configmap.yaml diff --git a/stable/librephotos/1.0.0/values.yaml b/stable/librephotos/1.0.1/values.yaml similarity index 100% rename from stable/librephotos/1.0.0/values.yaml rename to stable/librephotos/1.0.1/values.yaml diff --git a/stable/littlelink/4.0.60/Chart.lock b/stable/littlelink/4.0.60/Chart.lock deleted file mode 100644 index 2e818e455e8..00000000000 --- a/stable/littlelink/4.0.60/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-08T16:46:52.299339805Z" diff --git a/stable/littlelink/4.0.60/CHANGELOG.md b/stable/littlelink/4.0.61/CHANGELOG.md similarity index 91% rename from stable/littlelink/4.0.60/CHANGELOG.md rename to stable/littlelink/4.0.61/CHANGELOG.md index 2bddb845ce8..55816e63059 100644 --- a/stable/littlelink/4.0.60/CHANGELOG.md +++ b/stable/littlelink/4.0.61/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [littlelink-4.0.61](https://github.com/truecharts/apps/compare/littlelink-4.0.60...littlelink-4.0.61) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [littlelink-4.0.60](https://github.com/truecharts/apps/compare/littlelink-4.0.59...littlelink-4.0.60) (2022-02-08) @@ -88,12 +97,3 @@ #### Chore -* update helm general non-major helm releases ([#1759](https://github.com/truecharts/apps/issues/1759)) - -#### Fix - -* set additional_attrs: true on all dicts ([#1750](https://github.com/truecharts/apps/issues/1750)) - - - - diff --git a/stable/littlelink/4.0.60/CONFIG.md b/stable/littlelink/4.0.61/CONFIG.md similarity index 100% rename from stable/littlelink/4.0.60/CONFIG.md rename to stable/littlelink/4.0.61/CONFIG.md diff --git a/stable/littlelink/4.0.61/Chart.lock b/stable/littlelink/4.0.61/Chart.lock new file mode 100644 index 00000000000..acde4ff14d5 --- /dev/null +++ b/stable/littlelink/4.0.61/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:45:23.630584021Z" diff --git a/stable/littlelink/4.0.60/Chart.yaml b/stable/littlelink/4.0.61/Chart.yaml similarity index 97% rename from stable/littlelink/4.0.60/Chart.yaml rename to stable/littlelink/4.0.61/Chart.yaml index b991c42113f..5d6ee808ce0 100644 --- a/stable/littlelink/4.0.60/Chart.yaml +++ b/stable/littlelink/4.0.61/Chart.yaml @@ -20,7 +20,7 @@ sources: - https://github.com/techno-tim/littlelink-server - https://github.com/sethcottle/littlelink type: application -version: 4.0.60 +version: 4.0.61 annotations: truecharts.org/catagories: | - social diff --git a/stable/littlelink/4.0.60/README.md b/stable/littlelink/4.0.61/README.md similarity index 100% rename from stable/littlelink/4.0.60/README.md rename to stable/littlelink/4.0.61/README.md diff --git a/stable/littlelink/4.0.60/app-readme.md b/stable/littlelink/4.0.61/app-readme.md similarity index 100% rename from stable/littlelink/4.0.60/app-readme.md rename to stable/littlelink/4.0.61/app-readme.md diff --git a/stable/littlelink/4.0.60/charts/common-8.15.2.tgz b/stable/littlelink/4.0.61/charts/common-8.15.2.tgz similarity index 100% rename from stable/littlelink/4.0.60/charts/common-8.15.2.tgz rename to stable/littlelink/4.0.61/charts/common-8.15.2.tgz diff --git a/stable/littlelink/4.0.60/helm-values.md b/stable/littlelink/4.0.61/helm-values.md similarity index 95% rename from stable/littlelink/4.0.60/helm-values.md rename to stable/littlelink/4.0.61/helm-values.md index 9c99d8c73bf..9d5cdbdb209 100644 --- a/stable/littlelink/4.0.60/helm-values.md +++ b/stable/littlelink/4.0.61/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | envFrom[0].configMapRef.name | string | `"littlelinkconfig"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/littlelink-server"` | | -| image.tag | string | `"latest@sha256:90adfce7abc33ce21a930297cb38ee12f9bad270d703ac3139547e0038fcaf1c"` | | +| image.tag | string | `"latest@sha256:0eb3ae0ddecedd709d3831e0aff0f653abdf239b05ac1d27da9f552cf1b5ffc1"` | | | littlelink.avatar_2x_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_400x400.jpg"` | | | littlelink.avatar_alt | string | `"techno tim profile pic"` | | | littlelink.avatar_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_200x200.jpg"` | | diff --git a/stable/littlelink/4.0.60/ix_values.yaml b/stable/littlelink/4.0.61/ix_values.yaml similarity index 93% rename from stable/littlelink/4.0.60/ix_values.yaml rename to stable/littlelink/4.0.61/ix_values.yaml index 6c27eda449f..aa0dd0ef2e9 100644 --- a/stable/littlelink/4.0.60/ix_values.yaml +++ b/stable/littlelink/4.0.61/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/littlelink-server pullPolicy: IfNotPresent - tag: latest@sha256:90adfce7abc33ce21a930297cb38ee12f9bad270d703ac3139547e0038fcaf1c + tag: latest@sha256:0eb3ae0ddecedd709d3831e0aff0f653abdf239b05ac1d27da9f552cf1b5ffc1 service: main: diff --git a/stable/littlelink/4.0.60/questions.yaml b/stable/littlelink/4.0.61/questions.yaml similarity index 100% rename from stable/littlelink/4.0.60/questions.yaml rename to stable/littlelink/4.0.61/questions.yaml diff --git a/stable/littlelink/4.0.60/security.md b/stable/littlelink/4.0.61/security.md similarity index 99% rename from stable/littlelink/4.0.60/security.md rename to stable/littlelink/4.0.61/security.md index f9e86fb20cb..a3724f71187 100644 --- a/stable/littlelink/4.0.60/security.md +++ b/stable/littlelink/4.0.61/security.md @@ -43,7 +43,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/littlelink-server:latest@sha256:90adfce7abc33ce21a930297cb38ee12f9bad270d703ac3139547e0038fcaf1c + tccr.io/truecharts/littlelink-server:latest@sha256:0eb3ae0ddecedd709d3831e0aff0f653abdf239b05ac1d27da9f552cf1b5ffc1 ##### Scan Results @@ -112,7 +112,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:90adfce7abc33ce21a930297cb38ee12f9bad270d703ac3139547e0038fcaf1c (alpine 3.15.0) +#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:0eb3ae0ddecedd709d3831e0aff0f653abdf239b05ac1d27da9f552cf1b5ffc1 (alpine 3.15.0) **alpine** diff --git a/stable/littlelink/4.0.60/templates/_configmap.tpl b/stable/littlelink/4.0.61/templates/_configmap.tpl similarity index 100% rename from stable/littlelink/4.0.60/templates/_configmap.tpl rename to stable/littlelink/4.0.61/templates/_configmap.tpl diff --git a/stable/littlelink/4.0.60/templates/common.yaml b/stable/littlelink/4.0.61/templates/common.yaml similarity index 100% rename from stable/littlelink/4.0.60/templates/common.yaml rename to stable/littlelink/4.0.61/templates/common.yaml diff --git a/stable/littlelink/4.0.60/values.yaml b/stable/littlelink/4.0.61/values.yaml similarity index 100% rename from stable/littlelink/4.0.60/values.yaml rename to stable/littlelink/4.0.61/values.yaml diff --git a/stable/ombi/9.0.47/Chart.lock b/stable/ombi/9.0.47/Chart.lock deleted file mode 100644 index 82abf863e7c..00000000000 --- a/stable/ombi/9.0.47/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-08T16:51:14.268503714Z" diff --git a/stable/ombi/9.0.47/CHANGELOG.md b/stable/ombi/9.0.48/CHANGELOG.md similarity index 91% rename from stable/ombi/9.0.47/CHANGELOG.md rename to stable/ombi/9.0.48/CHANGELOG.md index 9fcdec9876b..e06f9ef2aba 100644 --- a/stable/ombi/9.0.47/CHANGELOG.md +++ b/stable/ombi/9.0.48/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [ombi-9.0.48](https://github.com/truecharts/apps/compare/ombi-9.0.47...ombi-9.0.48) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [ombi-9.0.47](https://github.com/truecharts/apps/compare/ombi-9.0.46...ombi-9.0.47) (2022-02-08) @@ -88,12 +97,3 @@ - -### [ombi-9.0.38](https://github.com/truecharts/apps/compare/ombi-9.0.37...ombi-9.0.38) (2022-01-18) - -#### Chore - -* update helm general non-major helm releases ([#1732](https://github.com/truecharts/apps/issues/1732)) - - - diff --git a/stable/ombi/9.0.47/CONFIG.md b/stable/ombi/9.0.48/CONFIG.md similarity index 100% rename from stable/ombi/9.0.47/CONFIG.md rename to stable/ombi/9.0.48/CONFIG.md diff --git a/stable/ombi/9.0.48/Chart.lock b/stable/ombi/9.0.48/Chart.lock new file mode 100644 index 00000000000..a16e6571895 --- /dev/null +++ b/stable/ombi/9.0.48/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:45:33.899518819Z" diff --git a/stable/ombi/9.0.47/Chart.yaml b/stable/ombi/9.0.48/Chart.yaml similarity index 94% rename from stable/ombi/9.0.47/Chart.yaml rename to stable/ombi/9.0.48/Chart.yaml index 71fcd4789a2..0351f662268 100644 --- a/stable/ombi/9.0.47/Chart.yaml +++ b/stable/ombi/9.0.48/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "4.11.5" +appVersion: "4.11.8" dependencies: - name: common repository: https://truecharts.org @@ -24,7 +24,7 @@ name: ombi sources: - https://github.com/tidusjar/Ombi type: application -version: 9.0.47 +version: 9.0.48 annotations: truecharts.org/catagories: | - media diff --git a/stable/ombi/9.0.47/README.md b/stable/ombi/9.0.48/README.md similarity index 100% rename from stable/ombi/9.0.47/README.md rename to stable/ombi/9.0.48/README.md diff --git a/stable/ombi/9.0.47/app-readme.md b/stable/ombi/9.0.48/app-readme.md similarity index 100% rename from stable/ombi/9.0.47/app-readme.md rename to stable/ombi/9.0.48/app-readme.md diff --git a/stable/ombi/9.0.47/charts/common-8.15.2.tgz b/stable/ombi/9.0.48/charts/common-8.15.2.tgz similarity index 100% rename from stable/ombi/9.0.47/charts/common-8.15.2.tgz rename to stable/ombi/9.0.48/charts/common-8.15.2.tgz diff --git a/stable/ombi/9.0.47/helm-values.md b/stable/ombi/9.0.48/helm-values.md similarity index 92% rename from stable/ombi/9.0.47/helm-values.md rename to stable/ombi/9.0.48/helm-values.md index d026587cb61..40f922c229a 100644 --- a/stable/ombi/9.0.47/helm-values.md +++ b/stable/ombi/9.0.48/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/ombi"` | | -| image.tag | string | `"v4.11.5@sha256:85964d2e669ab51d08597c29980c7fa54903ac8956245a8c2d7ffcab8e5e551f"` | | +| image.tag | string | `"v4.11.8@sha256:343c1fcdca358ef98301d4c702065edae80711831b169e4361318bbea818414c"` | | | mariadb.architecture | string | `"standalone"` | | | mariadb.auth.database | string | `"ombi"` | | | mariadb.auth.password | string | `"ombi"` | | diff --git a/stable/ombi/9.0.47/ix_values.yaml b/stable/ombi/9.0.48/ix_values.yaml similarity index 87% rename from stable/ombi/9.0.47/ix_values.yaml rename to stable/ombi/9.0.48/ix_values.yaml index 20b5c4d0c34..990c47cf249 100644 --- a/stable/ombi/9.0.47/ix_values.yaml +++ b/stable/ombi/9.0.48/ix_values.yaml @@ -1,7 +1,7 @@ image: repository: tccr.io/truecharts/ombi pullPolicy: IfNotPresent - tag: v4.11.5@sha256:85964d2e669ab51d08597c29980c7fa54903ac8956245a8c2d7ffcab8e5e551f + tag: v4.11.8@sha256:343c1fcdca358ef98301d4c702065edae80711831b169e4361318bbea818414c securityContext: readOnlyRootFilesystem: false diff --git a/stable/ombi/9.0.47/questions.yaml b/stable/ombi/9.0.48/questions.yaml similarity index 100% rename from stable/ombi/9.0.47/questions.yaml rename to stable/ombi/9.0.48/questions.yaml diff --git a/stable/ombi/9.0.47/security.md b/stable/ombi/9.0.48/security.md similarity index 95% rename from stable/ombi/9.0.47/security.md rename to stable/ombi/9.0.48/security.md index 68ff271ad96..4d6b4e2da30 100644 --- a/stable/ombi/9.0.47/security.md +++ b/stable/ombi/9.0.48/security.md @@ -44,7 +44,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/ombi:v4.11.5@sha256:85964d2e669ab51d08597c29980c7fa54903ac8956245a8c2d7ffcab8e5e551f + tccr.io/truecharts/ombi:v4.11.8@sha256:343c1fcdca358ef98301d4c702065edae80711831b169e4361318bbea818414c ##### Scan Results @@ -113,7 +113,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/ombi:v4.11.5@sha256:85964d2e669ab51d08597c29980c7fa54903ac8956245a8c2d7ffcab8e5e551f (ubuntu 20.04) +#### Container: tccr.io/truecharts/ombi:v4.11.8@sha256:343c1fcdca358ef98301d4c702065edae80711831b169e4361318bbea818414c (ubuntu 20.04) **ubuntu** @@ -122,18 +122,16 @@ hide: | Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | bash | CVE-2019-18276 | LOW | 5.0-6ubuntu1.1 | |
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://www.youtube.com/watch?v=-wGtxJ8opa8
| -| bsdutils | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| bsdutils | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| bsdutils | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| bsdutils | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | |
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
| -| fdisk | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| fdisk | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| fdisk | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| fdisk | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| -| libblkid1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| libblkid1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libblkid1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libblkid1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | libc-bin | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | libc-bin | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| libc-bin | CVE-2022-23218 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| libc-bin | CVE-2022-23219 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| | libc-bin | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| | libc-bin | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://www.oracle.com/security-alerts/cpujan2022.html
| @@ -143,10 +141,10 @@ hide: | libc-bin | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libc-bin | CVE-2021-33574 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc-bin | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| libc-bin | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | libc6 | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| libc6 | CVE-2022-23218 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| libc6 | CVE-2022-23219 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| | libc6 | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| | libc6 | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://www.oracle.com/security-alerts/cpujan2022.html
| @@ -156,10 +154,12 @@ hide: | libc6 | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libc6 | CVE-2021-33574 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc6 | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| -| libexpat1 | CVE-2022-23852 | MEDIUM | 2.2.9-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
| -| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.9-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
| -| libfdisk1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| libfdisk1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libc6 | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| +| libexpat1 | CVE-2022-23852 | MEDIUM | 2.2.9-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23990 | MEDIUM | 2.2.9-1build1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://www.tenable.com/security/tns-2022-05
| +| libfdisk1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libfdisk1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | |
Expand...https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
| | libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| @@ -175,8 +175,8 @@ hide: | libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libkrb5support0 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libmount1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| libmount1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libmount1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libmount1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-12build1 | |
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| | libpcre3 | CVE-2019-20838 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| | libpcre3 | CVE-2020-14155 | LOW | 2:8.39-12build1 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
| @@ -189,20 +189,18 @@ hide: | libsepol1 | CVE-2021-36085 | LOW | 3.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| | libsepol1 | CVE-2021-36086 | LOW | 3.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
| | libsepol1 | CVE-2021-36087 | LOW | 3.0-1 | |
Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
| -| libsmartcols1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| libsmartcols1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libsmartcols1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libsmartcols1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
| | libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
| | libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
| | libsqlite3-0 | CVE-2021-36690 | LOW | 3.31.1-4ubuntu0.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
| | libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | |
Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
| -| libuuid1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| libuuid1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libuuid1 | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| libuuid1 | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
| | locales | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
| | locales | CVE-2021-3999 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
| -| locales | CVE-2022-23218 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| -| locales | CVE-2022-23219 | MEDIUM | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | locales | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
| | locales | CVE-2019-25013 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
| | locales | CVE-2020-27618 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://www.oracle.com/security-alerts/cpujan2022.html
| @@ -212,17 +210,19 @@ hide: | locales | CVE-2021-3326 | LOW | 2.31-0ubuntu9.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | locales | CVE-2021-33574 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | locales | CVE-2021-35942 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| +| locales | CVE-2022-23218 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | LOW | 2.31-0ubuntu9.2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | login | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| -| mount | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| mount | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| mount | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| mount | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1ubuntu5.20.04.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | |
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
| | python3.8 | CVE-2021-4189 | MEDIUM | 3.8.10-0ubuntu1~20.04.2 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| | python3.8 | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | python3.8-minimal | CVE-2021-4189 | MEDIUM | 3.8.10-0ubuntu1~20.04.2 | |
Expand...https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
| | python3.8-minimal | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04.2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| util-linux | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| -| util-linux | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| util-linux | CVE-2021-3995 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| +| util-linux | CVE-2021-3996 | MEDIUM | 2.34-0.1ubuntu9.1 | 2.34-0.1ubuntu9.3 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | vim-common | CVE-2021-4166 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
| | vim-common | CVE-2022-0351 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
| | vim-common | CVE-2022-0359 | MEDIUM | 2:8.1.2269-1ubuntu5.7 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
| diff --git a/stable/ombi/9.0.47/templates/common.yaml b/stable/ombi/9.0.48/templates/common.yaml similarity index 100% rename from stable/ombi/9.0.47/templates/common.yaml rename to stable/ombi/9.0.48/templates/common.yaml diff --git a/stable/ombi/9.0.47/values.yaml b/stable/ombi/9.0.48/values.yaml similarity index 100% rename from stable/ombi/9.0.47/values.yaml rename to stable/ombi/9.0.48/values.yaml diff --git a/stable/piaware/4.0.54/Chart.lock b/stable/piaware/4.0.54/Chart.lock deleted file mode 100644 index e228304a78c..00000000000 --- a/stable/piaware/4.0.54/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://truecharts.org - version: 8.15.2 -digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 -generated: "2022-02-10T16:21:16.121349667Z" diff --git a/stable/piaware/4.0.54/CHANGELOG.md b/stable/piaware/4.0.55/CHANGELOG.md similarity index 92% rename from stable/piaware/4.0.54/CHANGELOG.md rename to stable/piaware/4.0.55/CHANGELOG.md index b5917735445..b9e10b7496a 100644 --- a/stable/piaware/4.0.54/CHANGELOG.md +++ b/stable/piaware/4.0.55/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [piaware-4.0.55](https://github.com/truecharts/apps/compare/piaware-4.0.54...piaware-4.0.55) (2022-02-14) + +#### Chore + +* update docker general non-major ([#1895](https://github.com/truecharts/apps/issues/1895)) + + + ### [piaware-4.0.54](https://github.com/truecharts/apps/compare/piaware-4.0.53...piaware-4.0.54) (2022-02-10) @@ -88,12 +97,3 @@ ### [piaware-4.0.45](https://github.com/truecharts/apps/compare/piaware-4.0.44...piaware-4.0.45) (2022-01-21) -#### Chore - -* update helm general non-major helm releases ([#1759](https://github.com/truecharts/apps/issues/1759)) - -#### Fix - -* set additional_attrs: true on all dicts ([#1750](https://github.com/truecharts/apps/issues/1750)) - - diff --git a/stable/piaware/4.0.54/CONFIG.md b/stable/piaware/4.0.55/CONFIG.md similarity index 100% rename from stable/piaware/4.0.54/CONFIG.md rename to stable/piaware/4.0.55/CONFIG.md diff --git a/stable/piaware/4.0.55/Chart.lock b/stable/piaware/4.0.55/Chart.lock new file mode 100644 index 00000000000..6e404ea4564 --- /dev/null +++ b/stable/piaware/4.0.55/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://truecharts.org + version: 8.15.2 +digest: sha256:35e4c90b59bc29a3a760d22095d65932c8009e5267949bbbc2d04e23e5cbfd26 +generated: "2022-02-14T11:45:38.468103368Z" diff --git a/stable/piaware/4.0.54/Chart.yaml b/stable/piaware/4.0.55/Chart.yaml similarity index 97% rename from stable/piaware/4.0.54/Chart.yaml rename to stable/piaware/4.0.55/Chart.yaml index 4c66ea3d4be..4fc293339b9 100644 --- a/stable/piaware/4.0.54/Chart.yaml +++ b/stable/piaware/4.0.55/Chart.yaml @@ -19,7 +19,7 @@ maintainers: name: piaware sources: - https://github.com/flightaware/piaware -version: 4.0.54 +version: 4.0.55 annotations: truecharts.org/catagories: | - media diff --git a/stable/piaware/4.0.54/README.md b/stable/piaware/4.0.55/README.md similarity index 100% rename from stable/piaware/4.0.54/README.md rename to stable/piaware/4.0.55/README.md diff --git a/stable/piaware/4.0.54/app-readme.md b/stable/piaware/4.0.55/app-readme.md similarity index 100% rename from stable/piaware/4.0.54/app-readme.md rename to stable/piaware/4.0.55/app-readme.md diff --git a/stable/piaware/4.0.54/charts/common-8.15.2.tgz b/stable/piaware/4.0.55/charts/common-8.15.2.tgz similarity index 100% rename from stable/piaware/4.0.54/charts/common-8.15.2.tgz rename to stable/piaware/4.0.55/charts/common-8.15.2.tgz diff --git a/stable/piaware/4.0.54/ci/ct-values.yaml b/stable/piaware/4.0.55/ci/ct-values.yaml similarity index 100% rename from stable/piaware/4.0.54/ci/ct-values.yaml rename to stable/piaware/4.0.55/ci/ct-values.yaml diff --git a/stable/piaware/4.0.54/helm-values.md b/stable/piaware/4.0.55/helm-values.md similarity index 93% rename from stable/piaware/4.0.54/helm-values.md rename to stable/piaware/4.0.55/helm-values.md index 1f7c33be6d1..a2d2cfd67b2 100644 --- a/stable/piaware/4.0.54/helm-values.md +++ b/stable/piaware/4.0.55/helm-values.md @@ -16,7 +16,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"UTC"` | Set the container timezone | | image.pullPolicy | string | `"IfNotPresent"` | image pull policy | | image.repository | string | `"tccr.io/truecharts/piaware"` | image repository | -| image.tag | string | `"v7.1@sha256:69fd7290294c69c33d720bee5516736430d279c4f87a8868f751b1ded697a7f0"` | image tag | +| image.tag | string | `"v7.1@sha256:66f7877eaf20967a98a4dc0fd3e545d15a6d463a0197df0f00a3ac36af18a325"` | image tag | | persistence | object | See values.yaml | Configure persistence settings for the chart under this key. | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/stable/piaware/4.0.54/ix_values.yaml b/stable/piaware/4.0.55/ix_values.yaml similarity index 93% rename from stable/piaware/4.0.54/ix_values.yaml rename to stable/piaware/4.0.55/ix_values.yaml index 80af9e1579c..0165c8ea19c 100644 --- a/stable/piaware/4.0.54/ix_values.yaml +++ b/stable/piaware/4.0.55/ix_values.yaml @@ -2,7 +2,7 @@ image: # -- image repository repository: tccr.io/truecharts/piaware # -- image tag - tag: v7.1@sha256:69fd7290294c69c33d720bee5516736430d279c4f87a8868f751b1ded697a7f0 + tag: v7.1@sha256:66f7877eaf20967a98a4dc0fd3e545d15a6d463a0197df0f00a3ac36af18a325 # -- image pull policy pullPolicy: IfNotPresent diff --git a/stable/piaware/4.0.54/questions.yaml b/stable/piaware/4.0.55/questions.yaml similarity index 100% rename from stable/piaware/4.0.54/questions.yaml rename to stable/piaware/4.0.55/questions.yaml diff --git a/stable/piaware/4.0.54/security.md b/stable/piaware/4.0.55/security.md similarity index 98% rename from stable/piaware/4.0.54/security.md rename to stable/piaware/4.0.55/security.md index ae18299fee8..a758dceb03c 100644 --- a/stable/piaware/4.0.54/security.md +++ b/stable/piaware/4.0.55/security.md @@ -45,7 +45,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/piaware:v7.1@sha256:69fd7290294c69c33d720bee5516736430d279c4f87a8868f751b1ded697a7f0 + tccr.io/truecharts/piaware:v7.1@sha256:66f7877eaf20967a98a4dc0fd3e545d15a6d463a0197df0f00a3ac36af18a325 ##### Scan Results @@ -114,7 +114,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/piaware:v7.1@sha256:69fd7290294c69c33d720bee5516736430d279c4f87a8868f751b1ded697a7f0 (debian 11.2) +#### Container: tccr.io/truecharts/piaware:v7.1@sha256:66f7877eaf20967a98a4dc0fd3e545d15a6d463a0197df0f00a3ac36af18a325 (debian 11.2) **debian** @@ -155,16 +155,16 @@ hide: | libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| | libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| -| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.10-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.10-2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2021-45960 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://security.netapp.com/advisory/ntap-20220121-0004/
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2021-46143 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://security.netapp.com/advisory/ntap-20220121-0006/
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22825 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22826 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| -| libexpat1 | CVE-2022-22827 | HIGH | 2.2.10-2 | |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2021-45960 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://security.netapp.com/advisory/ntap-20220121-0004/
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2021-46143 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://security.netapp.com/advisory/ntap-20220121-0006/
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22825 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22826 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| +| libexpat1 | CVE-2022-22827 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 |
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://github.com/libexpat/libexpat/pull/539
https://www.tenable.com/security/tns-2022-05
| | libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2 | |
Expand...http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
| | libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2021-4409.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 | |
Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://www.oracle.com/security-alerts/cpujan2020.html
| diff --git a/stable/piaware/4.0.54/templates/common.yaml b/stable/piaware/4.0.55/templates/common.yaml similarity index 100% rename from stable/piaware/4.0.54/templates/common.yaml rename to stable/piaware/4.0.55/templates/common.yaml diff --git a/stable/piaware/4.0.54/values.yaml b/stable/piaware/4.0.55/values.yaml similarity index 100% rename from stable/piaware/4.0.54/values.yaml rename to stable/piaware/4.0.55/values.yaml