diff --git a/core/prometheus/1.1.9/CHANGELOG.md b/core/prometheus/1.1.10/CHANGELOG.md
similarity index 91%
rename from core/prometheus/1.1.9/CHANGELOG.md
rename to core/prometheus/1.1.10/CHANGELOG.md
index c91f5b2e58f..730a2147916 100644
--- a/core/prometheus/1.1.9/CHANGELOG.md
+++ b/core/prometheus/1.1.10/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [prometheus-1.1.10](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-1.0.8...prometheus-1.1.10) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### prometheus-1.1.9 (2021-12-05)
@@ -88,12 +97,3 @@
* update non-major deps helm releases
-
-
-### [prometheus-1.1.0](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-1.0.0...prometheus-1.1.0) (2021-11-25)
-
-#### Feat
-
-* add more default exporters to prometheus ([#1406](https://github.com/truecharts/apps/issues/1406))
-
-
diff --git a/core/prometheus/1.1.9/CONFIG.md b/core/prometheus/1.1.10/CONFIG.md
similarity index 100%
rename from core/prometheus/1.1.9/CONFIG.md
rename to core/prometheus/1.1.10/CONFIG.md
diff --git a/core/prometheus/1.1.9/Chart.lock b/core/prometheus/1.1.10/Chart.lock
similarity index 88%
rename from core/prometheus/1.1.9/Chart.lock
rename to core/prometheus/1.1.10/Chart.lock
index 9a740617689..c8174fa4fbe 100644
--- a/core/prometheus/1.1.9/Chart.lock
+++ b/core/prometheus/1.1.10/Chart.lock
@@ -9,4 +9,4 @@ dependencies:
repository: https://charts.bitnami.com/bitnami
version: 2.1.18
digest: sha256:875cf07d887e9b1e351096d761dbb05d13ea7ce2052baadc29ebae08c6aa2afb
-generated: "2021-12-05T22:43:24.926532646Z"
+generated: "2021-12-07T09:21:31.738467865Z"
diff --git a/core/prometheus/1.1.9/Chart.yaml b/core/prometheus/1.1.10/Chart.yaml
similarity index 98%
rename from core/prometheus/1.1.9/Chart.yaml
rename to core/prometheus/1.1.10/Chart.yaml
index d669036a345..b8761e0856a 100644
--- a/core/prometheus/1.1.9/Chart.yaml
+++ b/core/prometheus/1.1.10/Chart.yaml
@@ -28,7 +28,7 @@ sources:
- https://github.com/prometheus-community/helm-charts
- https://github.com/prometheus-operator/kube-prometheus
type: application
-version: 1.1.9
+version: 1.1.10
annotations:
truecharts.org/catagories: |
- metrics
diff --git a/core/prometheus/1.1.9/README.md b/core/prometheus/1.1.10/README.md
similarity index 100%
rename from core/prometheus/1.1.9/README.md
rename to core/prometheus/1.1.10/README.md
diff --git a/core/prometheus/1.1.9/app-readme.md b/core/prometheus/1.1.10/app-readme.md
similarity index 100%
rename from core/prometheus/1.1.9/app-readme.md
rename to core/prometheus/1.1.10/app-readme.md
diff --git a/core/prometheus/1.1.9/charts/common-8.9.13.tgz b/core/prometheus/1.1.10/charts/common-8.9.13.tgz
similarity index 100%
rename from core/prometheus/1.1.9/charts/common-8.9.13.tgz
rename to core/prometheus/1.1.10/charts/common-8.9.13.tgz
diff --git a/core/prometheus/1.1.9/charts/kube-state-metrics-2.1.18.tgz b/core/prometheus/1.1.10/charts/kube-state-metrics-2.1.18.tgz
similarity index 100%
rename from core/prometheus/1.1.9/charts/kube-state-metrics-2.1.18.tgz
rename to core/prometheus/1.1.10/charts/kube-state-metrics-2.1.18.tgz
diff --git a/core/prometheus/1.1.9/charts/node-exporter-2.3.17.tgz b/core/prometheus/1.1.10/charts/node-exporter-2.3.17.tgz
similarity index 100%
rename from core/prometheus/1.1.9/charts/node-exporter-2.3.17.tgz
rename to core/prometheus/1.1.10/charts/node-exporter-2.3.17.tgz
diff --git a/core/prometheus/1.1.9/crds/crd-alertmanager-config.yaml b/core/prometheus/1.1.10/crds/crd-alertmanager-config.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-alertmanager-config.yaml
rename to core/prometheus/1.1.10/crds/crd-alertmanager-config.yaml
diff --git a/core/prometheus/1.1.9/crds/crd-alertmanager.yaml b/core/prometheus/1.1.10/crds/crd-alertmanager.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-alertmanager.yaml
rename to core/prometheus/1.1.10/crds/crd-alertmanager.yaml
diff --git a/core/prometheus/1.1.9/crds/crd-podmonitor.yaml b/core/prometheus/1.1.10/crds/crd-podmonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-podmonitor.yaml
rename to core/prometheus/1.1.10/crds/crd-podmonitor.yaml
diff --git a/core/prometheus/1.1.9/crds/crd-probes.yaml b/core/prometheus/1.1.10/crds/crd-probes.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-probes.yaml
rename to core/prometheus/1.1.10/crds/crd-probes.yaml
diff --git a/core/prometheus/1.1.9/crds/crd-prometheus.yaml b/core/prometheus/1.1.10/crds/crd-prometheus.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-prometheus.yaml
rename to core/prometheus/1.1.10/crds/crd-prometheus.yaml
diff --git a/core/prometheus/1.1.9/crds/crd-prometheusrules.yaml b/core/prometheus/1.1.10/crds/crd-prometheusrules.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-prometheusrules.yaml
rename to core/prometheus/1.1.10/crds/crd-prometheusrules.yaml
diff --git a/core/prometheus/1.1.9/crds/crd-servicemonitor.yaml b/core/prometheus/1.1.10/crds/crd-servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-servicemonitor.yaml
rename to core/prometheus/1.1.10/crds/crd-servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/crds/crd-thanosrulers.yaml b/core/prometheus/1.1.10/crds/crd-thanosrulers.yaml
similarity index 100%
rename from core/prometheus/1.1.9/crds/crd-thanosrulers.yaml
rename to core/prometheus/1.1.10/crds/crd-thanosrulers.yaml
diff --git a/core/prometheus/1.1.9/helm-values.md b/core/prometheus/1.1.10/helm-values.md
similarity index 98%
rename from core/prometheus/1.1.9/helm-values.md
rename to core/prometheus/1.1.10/helm-values.md
index 2ff602258de..bd28fdc85aa 100644
--- a/core/prometheus/1.1.9/helm-values.md
+++ b/core/prometheus/1.1.10/helm-values.md
@@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here
| alertmanager.volumeMounts | list | `[]` | |
| alertmanager.volumes | list | `[]` | |
| alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | |
-| alertmanagerImage.tag | string | `"v0.23.0@sha256:78f3ae147f588fee292a85187b5b501d9bcf269f0053e44f3b32153a0e2a0211"` | |
+| alertmanagerImage.tag | string | `"v0.23.0@sha256:d8ae1c5efca10d5989fbce97812b83760f2c75f5ba1b96b92d8e820842b4a9de"` | |
| coreDns.enabled | bool | `true` | |
| coreDns.namespace | string | `"kube-system"` | |
| coreDns.service.enabled | bool | `true` | |
@@ -104,7 +104,7 @@ You will, however, be able to use all values referenced in the common chart here
| exporters.node-exporter.enabled | bool | `true` | |
| global.labels | object | `{}` | |
| image.repository | string | `"tccr.io/truecharts/prometheus-operator"` | |
-| image.tag | string | `"v0.52.1@sha256:b267d77c77f2fffb62214643d7ee166f39723221a24f737c50d0e24302b939ed"` | |
+| image.tag | string | `"v0.52.1@sha256:fd9a3b1a2a38528afb98e6ab251ede1293c69b976f2b004130917fa8e95b0f8c"` | |
| ingress.alertmanager.enabled | bool | `false` | |
| ingress.main.enabled | bool | `false` | |
| ingress.thanos.enabled | bool | `false` | |
@@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here
| prometheus.volumes | list | `[]` | |
| prometheus.walCompression | bool | `false` | |
| prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | |
-| prometheusImage.tag | string | `"v2.31.1@sha256:430998652a057825bb2934b27ef48e0560007edb21ffc185fe618466b7ec8cde"` | |
+| prometheusImage.tag | string | `"v2.31.1@sha256:341f5e628268aad4c7f0cbe44382b993b326c6a71eec475a143d470128b75f79"` | |
| rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| service.alertmanager.enabled | bool | `true` | |
diff --git a/core/prometheus/1.1.9/ix_values.yaml b/core/prometheus/1.1.10/ix_values.yaml
similarity index 99%
rename from core/prometheus/1.1.9/ix_values.yaml
rename to core/prometheus/1.1.10/ix_values.yaml
index 31d2c85a7bf..f0230221d08 100644
--- a/core/prometheus/1.1.9/ix_values.yaml
+++ b/core/prometheus/1.1.10/ix_values.yaml
@@ -1,10 +1,10 @@
image:
repository: tccr.io/truecharts/prometheus-operator
- tag: v0.52.1@sha256:b267d77c77f2fffb62214643d7ee166f39723221a24f737c50d0e24302b939ed
+ tag: v0.52.1@sha256:fd9a3b1a2a38528afb98e6ab251ede1293c69b976f2b004130917fa8e95b0f8c
prometheusImage:
repository: tccr.io/truecharts/prometheus
- tag: v2.31.1@sha256:430998652a057825bb2934b27ef48e0560007edb21ffc185fe618466b7ec8cde
+ tag: v2.31.1@sha256:341f5e628268aad4c7f0cbe44382b993b326c6a71eec475a143d470128b75f79
thanosImage:
repository: tccr.io/truecharts/thanos
@@ -12,7 +12,7 @@ thanosImage:
alertmanagerImage:
repository: tccr.io/truecharts/alertmanager
- tag: v0.23.0@sha256:78f3ae147f588fee292a85187b5b501d9bcf269f0053e44f3b32153a0e2a0211
+ tag: v0.23.0@sha256:d8ae1c5efca10d5989fbce97812b83760f2c75f5ba1b96b92d8e820842b4a9de
global:
labels: {}
diff --git a/core/prometheus/1.1.9/questions.yaml b/core/prometheus/1.1.10/questions.yaml
similarity index 100%
rename from core/prometheus/1.1.9/questions.yaml
rename to core/prometheus/1.1.10/questions.yaml
diff --git a/core/prometheus/1.1.9/security.md b/core/prometheus/1.1.10/security.md
similarity index 99%
rename from core/prometheus/1.1.9/security.md
rename to core/prometheus/1.1.10/security.md
index 7dba1edfe80..d7425c40d81 100644
--- a/core/prometheus/1.1.9/security.md
+++ b/core/prometheus/1.1.10/security.md
@@ -176,7 +176,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:b267d77c77f2fffb62214643d7ee166f39723221a24f737c50d0e24302b939ed
+ tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:fd9a3b1a2a38528afb98e6ab251ede1293c69b976f2b004130917fa8e95b0f8c
bitnami/kube-state-metrics:2.2.4-debian-10-r0
bitnami/node-exporter:1.3.1-debian-10-r0
@@ -215,7 +215,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:b267d77c77f2fffb62214643d7ee166f39723221a24f737c50d0e24302b939ed (debian 10.11)
+#### Container: tccr.io/truecharts/prometheus-operator:v0.52.1@sha256:fd9a3b1a2a38528afb98e6ab251ede1293c69b976f2b004130917fa8e95b0f8c (debian 10.11)
**debian**
diff --git a/core/prometheus/1.1.9/templates/_helpers.tpl b/core/prometheus/1.1.10/templates/_helpers.tpl
similarity index 100%
rename from core/prometheus/1.1.9/templates/_helpers.tpl
rename to core/prometheus/1.1.10/templates/_helpers.tpl
diff --git a/core/prometheus/1.1.9/templates/alertmanager/_alertmanager.tpl b/core/prometheus/1.1.10/templates/alertmanager/_alertmanager.tpl
similarity index 100%
rename from core/prometheus/1.1.9/templates/alertmanager/_alertmanager.tpl
rename to core/prometheus/1.1.10/templates/alertmanager/_alertmanager.tpl
diff --git a/core/prometheus/1.1.9/templates/alertmanager/secrets.yaml b/core/prometheus/1.1.10/templates/alertmanager/secrets.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/alertmanager/secrets.yaml
rename to core/prometheus/1.1.10/templates/alertmanager/secrets.yaml
diff --git a/core/prometheus/1.1.9/templates/alertmanager/serviceaccount.yaml b/core/prometheus/1.1.10/templates/alertmanager/serviceaccount.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/alertmanager/serviceaccount.yaml
rename to core/prometheus/1.1.10/templates/alertmanager/serviceaccount.yaml
diff --git a/core/prometheus/1.1.9/templates/alertmanager/servicemonitor.yaml b/core/prometheus/1.1.10/templates/alertmanager/servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/alertmanager/servicemonitor.yaml
rename to core/prometheus/1.1.10/templates/alertmanager/servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/templates/common.yaml b/core/prometheus/1.1.10/templates/common.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/common.yaml
rename to core/prometheus/1.1.10/templates/common.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/core-dns/service.yaml b/core/prometheus/1.1.10/templates/exporters/core-dns/service.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/core-dns/service.yaml
rename to core/prometheus/1.1.10/templates/exporters/core-dns/service.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/core-dns/servicemonitor.yaml b/core/prometheus/1.1.10/templates/exporters/core-dns/servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/core-dns/servicemonitor.yaml
rename to core/prometheus/1.1.10/templates/exporters/core-dns/servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kube-apiserver/servicemonitor.yaml b/core/prometheus/1.1.10/templates/exporters/kube-apiserver/servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kube-apiserver/servicemonitor.yaml
rename to core/prometheus/1.1.10/templates/exporters/kube-apiserver/servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kube-controller-manager/endpoints.yaml b/core/prometheus/1.1.10/templates/exporters/kube-controller-manager/endpoints.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kube-controller-manager/endpoints.yaml
rename to core/prometheus/1.1.10/templates/exporters/kube-controller-manager/endpoints.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kube-controller-manager/service.yaml b/core/prometheus/1.1.10/templates/exporters/kube-controller-manager/service.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kube-controller-manager/service.yaml
rename to core/prometheus/1.1.10/templates/exporters/kube-controller-manager/service.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kube-controller-manager/servicemonitor.yaml b/core/prometheus/1.1.10/templates/exporters/kube-controller-manager/servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kube-controller-manager/servicemonitor.yaml
rename to core/prometheus/1.1.10/templates/exporters/kube-controller-manager/servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kube-scheduler/endpoints.yaml b/core/prometheus/1.1.10/templates/exporters/kube-scheduler/endpoints.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kube-scheduler/endpoints.yaml
rename to core/prometheus/1.1.10/templates/exporters/kube-scheduler/endpoints.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kube-scheduler/service.yaml b/core/prometheus/1.1.10/templates/exporters/kube-scheduler/service.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kube-scheduler/service.yaml
rename to core/prometheus/1.1.10/templates/exporters/kube-scheduler/service.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kube-scheduler/servicemonitor.yaml b/core/prometheus/1.1.10/templates/exporters/kube-scheduler/servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kube-scheduler/servicemonitor.yaml
rename to core/prometheus/1.1.10/templates/exporters/kube-scheduler/servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/templates/exporters/kubelet/servicemonitor.yaml b/core/prometheus/1.1.10/templates/exporters/kubelet/servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/exporters/kubelet/servicemonitor.yaml
rename to core/prometheus/1.1.10/templates/exporters/kubelet/servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/templates/operator/_args.tpl b/core/prometheus/1.1.10/templates/operator/_args.tpl
similarity index 100%
rename from core/prometheus/1.1.9/templates/operator/_args.tpl
rename to core/prometheus/1.1.10/templates/operator/_args.tpl
diff --git a/core/prometheus/1.1.9/templates/operator/configmap.yaml b/core/prometheus/1.1.10/templates/operator/configmap.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/operator/configmap.yaml
rename to core/prometheus/1.1.10/templates/operator/configmap.yaml
diff --git a/core/prometheus/1.1.9/templates/operator/servicemonitor.yaml b/core/prometheus/1.1.10/templates/operator/servicemonitor.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/operator/servicemonitor.yaml
rename to core/prometheus/1.1.10/templates/operator/servicemonitor.yaml
diff --git a/core/prometheus/1.1.9/templates/prometheus/_additionalPrometheusRules.tpl b/core/prometheus/1.1.10/templates/prometheus/_additionalPrometheusRules.tpl
similarity index 100%
rename from core/prometheus/1.1.9/templates/prometheus/_additionalPrometheusRules.tpl
rename to core/prometheus/1.1.10/templates/prometheus/_additionalPrometheusRules.tpl
diff --git a/core/prometheus/1.1.9/templates/prometheus/_additionalScrapeJobs.tpl b/core/prometheus/1.1.10/templates/prometheus/_additionalScrapeJobs.tpl
similarity index 100%
rename from core/prometheus/1.1.9/templates/prometheus/_additionalScrapeJobs.tpl
rename to core/prometheus/1.1.10/templates/prometheus/_additionalScrapeJobs.tpl
diff --git a/core/prometheus/1.1.9/templates/prometheus/_prometheus.tpl b/core/prometheus/1.1.10/templates/prometheus/_prometheus.tpl
similarity index 100%
rename from core/prometheus/1.1.9/templates/prometheus/_prometheus.tpl
rename to core/prometheus/1.1.10/templates/prometheus/_prometheus.tpl
diff --git a/core/prometheus/1.1.9/templates/prometheus/_servicemonitor.tpl b/core/prometheus/1.1.10/templates/prometheus/_servicemonitor.tpl
similarity index 100%
rename from core/prometheus/1.1.9/templates/prometheus/_servicemonitor.tpl
rename to core/prometheus/1.1.10/templates/prometheus/_servicemonitor.tpl
diff --git a/core/prometheus/1.1.9/templates/prometheus/clusterrole.yaml b/core/prometheus/1.1.10/templates/prometheus/clusterrole.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/prometheus/clusterrole.yaml
rename to core/prometheus/1.1.10/templates/prometheus/clusterrole.yaml
diff --git a/core/prometheus/1.1.9/templates/prometheus/clusterrolebinding.yaml b/core/prometheus/1.1.10/templates/prometheus/clusterrolebinding.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/prometheus/clusterrolebinding.yaml
rename to core/prometheus/1.1.10/templates/prometheus/clusterrolebinding.yaml
diff --git a/core/prometheus/1.1.9/templates/prometheus/serviceaccount.yaml b/core/prometheus/1.1.10/templates/prometheus/serviceaccount.yaml
similarity index 100%
rename from core/prometheus/1.1.9/templates/prometheus/serviceaccount.yaml
rename to core/prometheus/1.1.10/templates/prometheus/serviceaccount.yaml
diff --git a/core/prometheus/1.1.9/values.yaml b/core/prometheus/1.1.10/values.yaml
similarity index 100%
rename from core/prometheus/1.1.9/values.yaml
rename to core/prometheus/1.1.10/values.yaml
diff --git a/dependency/mariadb/1.0.25/CHANGELOG.md b/dependency/mariadb/1.0.26/CHANGELOG.md
similarity index 92%
rename from dependency/mariadb/1.0.25/CHANGELOG.md
rename to dependency/mariadb/1.0.26/CHANGELOG.md
index 604eb9ba1ba..1262bf86337 100644
--- a/dependency/mariadb/1.0.25/CHANGELOG.md
+++ b/dependency/mariadb/1.0.26/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [mariadb-1.0.26](https://github.com/truecharts/apps/compare/mariadb-1.0.25...mariadb-1.0.26) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### mariadb-1.0.25 (2021-12-05)
@@ -88,12 +97,3 @@
* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449))
-
-
-### [mariadb-1.0.18](https://github.com/truecharts/apps/compare/mariadb-1.0.17...mariadb-1.0.18) (2021-12-01)
-
-#### Chore
-
-* update non-major ([#1443](https://github.com/truecharts/apps/issues/1443))
-
-
diff --git a/dependency/mariadb/1.0.25/CONFIG.md b/dependency/mariadb/1.0.26/CONFIG.md
similarity index 100%
rename from dependency/mariadb/1.0.25/CONFIG.md
rename to dependency/mariadb/1.0.26/CONFIG.md
diff --git a/dependency/mariadb/1.0.25/Chart.lock b/dependency/mariadb/1.0.26/Chart.lock
similarity index 78%
rename from dependency/mariadb/1.0.25/Chart.lock
rename to dependency/mariadb/1.0.26/Chart.lock
index b3ca5198e7a..0ad537b7734 100644
--- a/dependency/mariadb/1.0.25/Chart.lock
+++ b/dependency/mariadb/1.0.26/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.9.13
digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T21:53:32.328821973Z"
+generated: "2021-12-07T09:21:25.542189312Z"
diff --git a/dependency/mariadb/1.0.25/Chart.yaml b/dependency/mariadb/1.0.26/Chart.yaml
similarity index 98%
rename from dependency/mariadb/1.0.25/Chart.yaml
rename to dependency/mariadb/1.0.26/Chart.yaml
index 6be28b1d7d1..4ba1f46e41c 100644
--- a/dependency/mariadb/1.0.25/Chart.yaml
+++ b/dependency/mariadb/1.0.26/Chart.yaml
@@ -24,7 +24,7 @@ sources:
- https://github.com/prometheus/mysqld_exporter
- https://mariadb.org
type: application
-version: 1.0.25
+version: 1.0.26
annotations:
truecharts.org/catagories: |
- database
diff --git a/dependency/mariadb/1.0.25/README.md b/dependency/mariadb/1.0.26/README.md
similarity index 100%
rename from dependency/mariadb/1.0.25/README.md
rename to dependency/mariadb/1.0.26/README.md
diff --git a/dependency/mariadb/1.0.25/app-readme.md b/dependency/mariadb/1.0.26/app-readme.md
similarity index 100%
rename from dependency/mariadb/1.0.25/app-readme.md
rename to dependency/mariadb/1.0.26/app-readme.md
diff --git a/dependency/mariadb/1.0.25/charts/common-8.9.13.tgz b/dependency/mariadb/1.0.26/charts/common-8.9.13.tgz
similarity index 100%
rename from dependency/mariadb/1.0.25/charts/common-8.9.13.tgz
rename to dependency/mariadb/1.0.26/charts/common-8.9.13.tgz
diff --git a/dependency/mariadb/1.0.25/helm-values.md b/dependency/mariadb/1.0.26/helm-values.md
similarity index 97%
rename from dependency/mariadb/1.0.25/helm-values.md
rename to dependency/mariadb/1.0.26/helm-values.md
index bda15db05b0..8e33eeb37fd 100644
--- a/dependency/mariadb/1.0.25/helm-values.md
+++ b/dependency/mariadb/1.0.26/helm-values.md
@@ -27,7 +27,7 @@ You will, however, be able to use all values referenced in the common chart here
| existingSecret | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/mariadb"` | |
-| image.tag | string | `"v10.6.5@sha256:dc3c7228f0f3e338195bbb61b2aebdaa3ed5858e60a4acf1cd5725a2193ab680"` | |
+| image.tag | string | `"v10.6.5@sha256:4cf8cd4011193e7e022adfaf2914ec9ab9009af00be0d9d5a6d7ca0fd07c5f15"` | |
| mariadbDatabase | string | `"test"` | |
| mariadbPassword | string | `"testpass"` | |
| mariadbRootPassword | string | `"testroot"` | |
diff --git a/dependency/mariadb/1.0.25/ix_values.yaml b/dependency/mariadb/1.0.26/ix_values.yaml
similarity index 97%
rename from dependency/mariadb/1.0.25/ix_values.yaml
rename to dependency/mariadb/1.0.26/ix_values.yaml
index 5f0bf1c6453..728bc1b2f39 100644
--- a/dependency/mariadb/1.0.25/ix_values.yaml
+++ b/dependency/mariadb/1.0.26/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: ghcr.io/truecharts/mariadb
pullPolicy: IfNotPresent
- tag: v10.6.5@sha256:dc3c7228f0f3e338195bbb61b2aebdaa3ed5858e60a4acf1cd5725a2193ab680
+ tag: v10.6.5@sha256:4cf8cd4011193e7e022adfaf2914ec9ab9009af00be0d9d5a6d7ca0fd07c5f15
controller:
# -- Set the controller type.
diff --git a/dependency/mariadb/1.0.25/questions.yaml b/dependency/mariadb/1.0.26/questions.yaml
similarity index 100%
rename from dependency/mariadb/1.0.25/questions.yaml
rename to dependency/mariadb/1.0.26/questions.yaml
diff --git a/dependency/mariadb/1.0.25/security.md b/dependency/mariadb/1.0.26/security.md
similarity index 99%
rename from dependency/mariadb/1.0.25/security.md
rename to dependency/mariadb/1.0.26/security.md
index 505363a3cd2..2eb092295c1 100644
--- a/dependency/mariadb/1.0.25/security.md
+++ b/dependency/mariadb/1.0.26/security.md
@@ -36,7 +36,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/mariadb:v10.6.5@sha256:dc3c7228f0f3e338195bbb61b2aebdaa3ed5858e60a4acf1cd5725a2193ab680
+ tccr.io/truecharts/mariadb:v10.6.5@sha256:4cf8cd4011193e7e022adfaf2914ec9ab9009af00be0d9d5a6d7ca0fd07c5f15
##### Scan Results
@@ -73,7 +73,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/mariadb:v10.6.5@sha256:dc3c7228f0f3e338195bbb61b2aebdaa3ed5858e60a4acf1cd5725a2193ab680 (debian 10.11)
+#### Container: tccr.io/truecharts/mariadb:v10.6.5@sha256:4cf8cd4011193e7e022adfaf2914ec9ab9009af00be0d9d5a6d7ca0fd07c5f15 (debian 10.11)
**debian**
diff --git a/dependency/mariadb/1.0.25/templates/common.yaml b/dependency/mariadb/1.0.26/templates/common.yaml
similarity index 100%
rename from dependency/mariadb/1.0.25/templates/common.yaml
rename to dependency/mariadb/1.0.26/templates/common.yaml
diff --git a/dependency/mariadb/1.0.25/templates/secret.yaml b/dependency/mariadb/1.0.26/templates/secret.yaml
similarity index 100%
rename from dependency/mariadb/1.0.25/templates/secret.yaml
rename to dependency/mariadb/1.0.26/templates/secret.yaml
diff --git a/dependency/mariadb/1.0.25/values.yaml b/dependency/mariadb/1.0.26/values.yaml
similarity index 100%
rename from dependency/mariadb/1.0.25/values.yaml
rename to dependency/mariadb/1.0.26/values.yaml
diff --git a/dependency/memcached/1.0.25/CHANGELOG.md b/dependency/memcached/1.0.26/CHANGELOG.md
similarity index 92%
rename from dependency/memcached/1.0.25/CHANGELOG.md
rename to dependency/memcached/1.0.26/CHANGELOG.md
index 2ba901214b6..86e8c5875fd 100644
--- a/dependency/memcached/1.0.25/CHANGELOG.md
+++ b/dependency/memcached/1.0.26/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [memcached-1.0.26](https://github.com/truecharts/apps/compare/memcached-1.0.25...memcached-1.0.26) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### memcached-1.0.25 (2021-12-05)
@@ -88,12 +97,3 @@
-### [memcached-1.0.18](https://github.com/truecharts/apps/compare/memcached-1.0.17...memcached-1.0.18) (2021-11-30)
-
-#### Chore
-
-* update common
-
-
-
-
diff --git a/dependency/memcached/1.0.25/CONFIG.md b/dependency/memcached/1.0.26/CONFIG.md
similarity index 100%
rename from dependency/memcached/1.0.25/CONFIG.md
rename to dependency/memcached/1.0.26/CONFIG.md
diff --git a/dependency/redis/1.0.27/Chart.lock b/dependency/memcached/1.0.26/Chart.lock
similarity index 78%
rename from dependency/redis/1.0.27/Chart.lock
rename to dependency/memcached/1.0.26/Chart.lock
index fa7c923512d..cbb684b0454 100644
--- a/dependency/redis/1.0.27/Chart.lock
+++ b/dependency/memcached/1.0.26/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.9.13
digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T21:53:53.946282373Z"
+generated: "2021-12-07T09:21:25.445307131Z"
diff --git a/dependency/memcached/1.0.25/Chart.yaml b/dependency/memcached/1.0.26/Chart.yaml
similarity index 97%
rename from dependency/memcached/1.0.25/Chart.yaml
rename to dependency/memcached/1.0.26/Chart.yaml
index 8f2ed86f6c2..a864783ec8a 100644
--- a/dependency/memcached/1.0.25/Chart.yaml
+++ b/dependency/memcached/1.0.26/Chart.yaml
@@ -22,7 +22,7 @@ sources:
- https://github.com/bitnami/bitnami-docker-memcached
- http://memcached.org/
type: application
-version: 1.0.25
+version: 1.0.26
annotations:
truecharts.org/catagories: |
- database
diff --git a/dependency/memcached/1.0.25/README.md b/dependency/memcached/1.0.26/README.md
similarity index 100%
rename from dependency/memcached/1.0.25/README.md
rename to dependency/memcached/1.0.26/README.md
diff --git a/dependency/memcached/1.0.25/app-readme.md b/dependency/memcached/1.0.26/app-readme.md
similarity index 100%
rename from dependency/memcached/1.0.25/app-readme.md
rename to dependency/memcached/1.0.26/app-readme.md
diff --git a/dependency/memcached/1.0.25/charts/common-8.9.13.tgz b/dependency/memcached/1.0.26/charts/common-8.9.13.tgz
similarity index 100%
rename from dependency/memcached/1.0.25/charts/common-8.9.13.tgz
rename to dependency/memcached/1.0.26/charts/common-8.9.13.tgz
diff --git a/dependency/memcached/1.0.25/helm-values.md b/dependency/memcached/1.0.26/helm-values.md
similarity index 89%
rename from dependency/memcached/1.0.25/helm-values.md
rename to dependency/memcached/1.0.26/helm-values.md
index cdc33bbb473..e05c519736c 100644
--- a/dependency/memcached/1.0.25/helm-values.md
+++ b/dependency/memcached/1.0.26/helm-values.md
@@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here
|-----|------|---------|-------------|
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/memcached"` | |
-| image.tag | string | `"v1.6.12@sha256:9e89ba2ea066867abaeacb2357d6a1f3b82e18898520c2f438a6b915b2409b79"` | |
+| image.tag | string | `"v1.6.12@sha256:cf415687a178294aebbb63d14c7b3819ff94c4ebd2e3ab478641d570712f99de"` | |
| service.main.ports.main.port | int | `11211` | |
| service.main.ports.main.targetPort | int | `11211` | |
diff --git a/dependency/memcached/1.0.25/ix_values.yaml b/dependency/memcached/1.0.26/ix_values.yaml
similarity index 65%
rename from dependency/memcached/1.0.25/ix_values.yaml
rename to dependency/memcached/1.0.26/ix_values.yaml
index 4061fb2c2c9..9cf85b0c161 100644
--- a/dependency/memcached/1.0.25/ix_values.yaml
+++ b/dependency/memcached/1.0.26/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: ghcr.io/truecharts/memcached
pullPolicy: IfNotPresent
- tag: v1.6.12@sha256:9e89ba2ea066867abaeacb2357d6a1f3b82e18898520c2f438a6b915b2409b79
+ tag: v1.6.12@sha256:cf415687a178294aebbb63d14c7b3819ff94c4ebd2e3ab478641d570712f99de
service:
main:
diff --git a/dependency/memcached/1.0.25/questions.yaml b/dependency/memcached/1.0.26/questions.yaml
similarity index 100%
rename from dependency/memcached/1.0.25/questions.yaml
rename to dependency/memcached/1.0.26/questions.yaml
diff --git a/dependency/memcached/1.0.25/security.md b/dependency/memcached/1.0.26/security.md
similarity index 99%
rename from dependency/memcached/1.0.25/security.md
rename to dependency/memcached/1.0.26/security.md
index c51f6ec04b6..58133052ef0 100644
--- a/dependency/memcached/1.0.25/security.md
+++ b/dependency/memcached/1.0.26/security.md
@@ -34,7 +34,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/memcached:v1.6.12@sha256:9e89ba2ea066867abaeacb2357d6a1f3b82e18898520c2f438a6b915b2409b79
+ tccr.io/truecharts/memcached:v1.6.12@sha256:cf415687a178294aebbb63d14c7b3819ff94c4ebd2e3ab478641d570712f99de
##### Scan Results
@@ -71,7 +71,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:9e89ba2ea066867abaeacb2357d6a1f3b82e18898520c2f438a6b915b2409b79 (debian 10.11)
+#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:cf415687a178294aebbb63d14c7b3819ff94c4ebd2e3ab478641d570712f99de (debian 10.11)
**debian**
diff --git a/dependency/memcached/1.0.25/templates/common.yaml b/dependency/memcached/1.0.26/templates/common.yaml
similarity index 100%
rename from dependency/memcached/1.0.25/templates/common.yaml
rename to dependency/memcached/1.0.26/templates/common.yaml
diff --git a/dependency/memcached/1.0.25/values.yaml b/dependency/memcached/1.0.26/values.yaml
similarity index 100%
rename from dependency/memcached/1.0.25/values.yaml
rename to dependency/memcached/1.0.26/values.yaml
diff --git a/dependency/postgresql/6.0.22/CHANGELOG.md b/dependency/postgresql/6.0.23/CHANGELOG.md
similarity index 92%
rename from dependency/postgresql/6.0.22/CHANGELOG.md
rename to dependency/postgresql/6.0.23/CHANGELOG.md
index 58c3311ba31..25e9a94520c 100644
--- a/dependency/postgresql/6.0.22/CHANGELOG.md
+++ b/dependency/postgresql/6.0.23/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [postgresql-6.0.23](https://github.com/truecharts/apps/compare/postgresql-6.0.22...postgresql-6.0.23) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### postgresql-6.0.22 (2021-12-05)
@@ -88,12 +97,3 @@
* update non-major ([#1443](https://github.com/truecharts/apps/issues/1443))
-
-
-### [postgresql-6.0.15](https://github.com/truecharts/apps/compare/postgresql-6.0.14...postgresql-6.0.15) (2021-11-30)
-
-#### Chore
-
-* update common
-
-
diff --git a/dependency/postgresql/6.0.22/CONFIG.md b/dependency/postgresql/6.0.23/CONFIG.md
similarity index 100%
rename from dependency/postgresql/6.0.22/CONFIG.md
rename to dependency/postgresql/6.0.23/CONFIG.md
diff --git a/dependency/memcached/1.0.25/Chart.lock b/dependency/postgresql/6.0.23/Chart.lock
similarity index 78%
rename from dependency/memcached/1.0.25/Chart.lock
rename to dependency/postgresql/6.0.23/Chart.lock
index 54dd1290d3a..44cec8a736b 100644
--- a/dependency/memcached/1.0.25/Chart.lock
+++ b/dependency/postgresql/6.0.23/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.9.13
digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T21:53:32.381249881Z"
+generated: "2021-12-07T09:21:25.423801413Z"
diff --git a/dependency/postgresql/6.0.22/Chart.yaml b/dependency/postgresql/6.0.23/Chart.yaml
similarity index 97%
rename from dependency/postgresql/6.0.22/Chart.yaml
rename to dependency/postgresql/6.0.23/Chart.yaml
index ba64beba5e8..af65f430544 100644
--- a/dependency/postgresql/6.0.22/Chart.yaml
+++ b/dependency/postgresql/6.0.23/Chart.yaml
@@ -22,7 +22,7 @@ name: postgresql
sources:
- https://www.postgresql.org/
type: application
-version: 6.0.22
+version: 6.0.23
annotations:
truecharts.org/catagories: |
- database
diff --git a/dependency/postgresql/6.0.22/README.md b/dependency/postgresql/6.0.23/README.md
similarity index 100%
rename from dependency/postgresql/6.0.22/README.md
rename to dependency/postgresql/6.0.23/README.md
diff --git a/dependency/postgresql/6.0.22/app-readme.md b/dependency/postgresql/6.0.23/app-readme.md
similarity index 100%
rename from dependency/postgresql/6.0.22/app-readme.md
rename to dependency/postgresql/6.0.23/app-readme.md
diff --git a/dependency/postgresql/6.0.22/charts/common-8.9.13.tgz b/dependency/postgresql/6.0.23/charts/common-8.9.13.tgz
similarity index 100%
rename from dependency/postgresql/6.0.22/charts/common-8.9.13.tgz
rename to dependency/postgresql/6.0.23/charts/common-8.9.13.tgz
diff --git a/dependency/postgresql/6.0.22/helm-values.md b/dependency/postgresql/6.0.23/helm-values.md
similarity index 96%
rename from dependency/postgresql/6.0.22/helm-values.md
rename to dependency/postgresql/6.0.23/helm-values.md
index 6894e7235c2..7045eac902b 100644
--- a/dependency/postgresql/6.0.22/helm-values.md
+++ b/dependency/postgresql/6.0.23/helm-values.md
@@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here
| existingSecret | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/postgresql"` | |
-| image.tag | string | `"v14.1.0@sha256:4816fcc7f4f3a5a6db13aa70aa3d374fec33e096051be22db6a72d96cf2d8da1"` | |
+| image.tag | string | `"v14.1.0@sha256:ff29616351d850a11f2dbd271420f89d6756d9ca78049f51a2a0a850b8c1f406"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| postgrespassword | string | `"testroot"` | |
| postgresqlDatabase | string | `"test"` | |
diff --git a/dependency/postgresql/6.0.22/ix_values.yaml b/dependency/postgresql/6.0.23/ix_values.yaml
similarity index 95%
rename from dependency/postgresql/6.0.22/ix_values.yaml
rename to dependency/postgresql/6.0.23/ix_values.yaml
index b4beadda2e0..bb41625cdba 100644
--- a/dependency/postgresql/6.0.22/ix_values.yaml
+++ b/dependency/postgresql/6.0.23/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: ghcr.io/truecharts/postgresql
pullPolicy: IfNotPresent
- tag: v14.1.0@sha256:4816fcc7f4f3a5a6db13aa70aa3d374fec33e096051be22db6a72d96cf2d8da1
+ tag: v14.1.0@sha256:ff29616351d850a11f2dbd271420f89d6756d9ca78049f51a2a0a850b8c1f406
controller:
# -- Set the controller type.
diff --git a/dependency/postgresql/6.0.22/questions.yaml b/dependency/postgresql/6.0.23/questions.yaml
similarity index 100%
rename from dependency/postgresql/6.0.22/questions.yaml
rename to dependency/postgresql/6.0.23/questions.yaml
diff --git a/dependency/postgresql/6.0.22/security.md b/dependency/postgresql/6.0.23/security.md
similarity index 99%
rename from dependency/postgresql/6.0.22/security.md
rename to dependency/postgresql/6.0.23/security.md
index dd192705402..ecc2a226e73 100644
--- a/dependency/postgresql/6.0.22/security.md
+++ b/dependency/postgresql/6.0.23/security.md
@@ -36,7 +36,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/postgresql:v14.1.0@sha256:4816fcc7f4f3a5a6db13aa70aa3d374fec33e096051be22db6a72d96cf2d8da1
+ tccr.io/truecharts/postgresql:v14.1.0@sha256:ff29616351d850a11f2dbd271420f89d6756d9ca78049f51a2a0a850b8c1f406
##### Scan Results
@@ -73,7 +73,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:4816fcc7f4f3a5a6db13aa70aa3d374fec33e096051be22db6a72d96cf2d8da1 (debian 10.11)
+#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:ff29616351d850a11f2dbd271420f89d6756d9ca78049f51a2a0a850b8c1f406 (debian 10.11)
**debian**
diff --git a/dependency/postgresql/6.0.22/templates/backup-postgres-config.yaml b/dependency/postgresql/6.0.23/templates/backup-postgres-config.yaml
similarity index 100%
rename from dependency/postgresql/6.0.22/templates/backup-postgres-config.yaml
rename to dependency/postgresql/6.0.23/templates/backup-postgres-config.yaml
diff --git a/dependency/postgresql/6.0.22/templates/common.yaml b/dependency/postgresql/6.0.23/templates/common.yaml
similarity index 100%
rename from dependency/postgresql/6.0.22/templates/common.yaml
rename to dependency/postgresql/6.0.23/templates/common.yaml
diff --git a/dependency/postgresql/6.0.22/templates/secret.yaml b/dependency/postgresql/6.0.23/templates/secret.yaml
similarity index 100%
rename from dependency/postgresql/6.0.22/templates/secret.yaml
rename to dependency/postgresql/6.0.23/templates/secret.yaml
diff --git a/dependency/postgresql/6.0.22/templates/upgrade-backup-postgres-hook.yaml b/dependency/postgresql/6.0.23/templates/upgrade-backup-postgres-hook.yaml
similarity index 100%
rename from dependency/postgresql/6.0.22/templates/upgrade-backup-postgres-hook.yaml
rename to dependency/postgresql/6.0.23/templates/upgrade-backup-postgres-hook.yaml
diff --git a/dependency/postgresql/6.0.22/values.yaml b/dependency/postgresql/6.0.23/values.yaml
similarity index 100%
rename from dependency/postgresql/6.0.22/values.yaml
rename to dependency/postgresql/6.0.23/values.yaml
diff --git a/dependency/redis/1.0.27/CHANGELOG.md b/dependency/redis/1.0.28/CHANGELOG.md
similarity index 92%
rename from dependency/redis/1.0.27/CHANGELOG.md
rename to dependency/redis/1.0.28/CHANGELOG.md
index 0db115003c5..70b50f8fc40 100644
--- a/dependency/redis/1.0.27/CHANGELOG.md
+++ b/dependency/redis/1.0.28/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [redis-1.0.28](https://github.com/truecharts/apps/compare/redis-1.0.27...redis-1.0.28) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### redis-1.0.27 (2021-12-05)
@@ -88,12 +97,3 @@
* move all container references to TCCR ([#1448](https://github.com/truecharts/apps/issues/1448))
* update non-major ([#1449](https://github.com/truecharts/apps/issues/1449))
-
-
-
-### [redis-1.0.20](https://github.com/truecharts/apps/compare/redis-1.0.19...redis-1.0.20) (2021-12-01)
-
-#### Chore
-
-* update non-major ([#1443](https://github.com/truecharts/apps/issues/1443))
-
diff --git a/dependency/redis/1.0.27/CONFIG.md b/dependency/redis/1.0.28/CONFIG.md
similarity index 100%
rename from dependency/redis/1.0.27/CONFIG.md
rename to dependency/redis/1.0.28/CONFIG.md
diff --git a/dependency/postgresql/6.0.22/Chart.lock b/dependency/redis/1.0.28/Chart.lock
similarity index 78%
rename from dependency/postgresql/6.0.22/Chart.lock
rename to dependency/redis/1.0.28/Chart.lock
index 1dce3abacbf..4215dff114f 100644
--- a/dependency/postgresql/6.0.22/Chart.lock
+++ b/dependency/redis/1.0.28/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.9.13
digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T21:53:32.376443316Z"
+generated: "2021-12-07T09:21:44.336661062Z"
diff --git a/dependency/redis/1.0.27/Chart.yaml b/dependency/redis/1.0.28/Chart.yaml
similarity index 97%
rename from dependency/redis/1.0.27/Chart.yaml
rename to dependency/redis/1.0.28/Chart.yaml
index 17de955ec3a..92ebb34a797 100644
--- a/dependency/redis/1.0.27/Chart.yaml
+++ b/dependency/redis/1.0.28/Chart.yaml
@@ -22,7 +22,7 @@ sources:
- https://github.com/bitnami/bitnami-docker-redis
- http://redis.io/
type: application
-version: 1.0.27
+version: 1.0.28
annotations:
truecharts.org/catagories: |
- database
diff --git a/dependency/redis/1.0.27/README.md b/dependency/redis/1.0.28/README.md
similarity index 100%
rename from dependency/redis/1.0.27/README.md
rename to dependency/redis/1.0.28/README.md
diff --git a/dependency/redis/1.0.27/app-readme.md b/dependency/redis/1.0.28/app-readme.md
similarity index 100%
rename from dependency/redis/1.0.27/app-readme.md
rename to dependency/redis/1.0.28/app-readme.md
diff --git a/dependency/redis/1.0.27/charts/common-8.9.13.tgz b/dependency/redis/1.0.28/charts/common-8.9.13.tgz
similarity index 100%
rename from dependency/redis/1.0.27/charts/common-8.9.13.tgz
rename to dependency/redis/1.0.28/charts/common-8.9.13.tgz
diff --git a/dependency/redis/1.0.27/helm-values.md b/dependency/redis/1.0.28/helm-values.md
similarity index 97%
rename from dependency/redis/1.0.27/helm-values.md
rename to dependency/redis/1.0.28/helm-values.md
index b9655210198..2daa34d6565 100644
--- a/dependency/redis/1.0.27/helm-values.md
+++ b/dependency/redis/1.0.28/helm-values.md
@@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here
| existingSecret | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/redis"` | |
-| image.tag | string | `"v6.2.6@sha256:6e06c5501bf222c04981b36c0c0827a364e7bb803aed4c6c226666aebe91822e"` | |
+| image.tag | string | `"v6.2.6@sha256:c20e11a71954610a6e27e4a4dbf37bd95f4c15aaeec798245b3a2e3c767fe2f6"` | |
| persistence.redis-health | object | See below | redis-health configmap mount |
| persistence.redis-health.mountPath | string | `"/health"` | Where to mount the volume in the main container. Defaults to `/`, setting to '-' creates the volume but disables the volumeMount. |
| persistence.redis-health.readOnly | bool | `false` | Specify if the volume should be mounted read-only. |
diff --git a/dependency/redis/1.0.27/ix_values.yaml b/dependency/redis/1.0.28/ix_values.yaml
similarity index 97%
rename from dependency/redis/1.0.27/ix_values.yaml
rename to dependency/redis/1.0.28/ix_values.yaml
index cad32610de8..0f9de502ea7 100644
--- a/dependency/redis/1.0.27/ix_values.yaml
+++ b/dependency/redis/1.0.28/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: ghcr.io/truecharts/redis
pullPolicy: IfNotPresent
- tag: v6.2.6@sha256:6e06c5501bf222c04981b36c0c0827a364e7bb803aed4c6c226666aebe91822e
+ tag: v6.2.6@sha256:c20e11a71954610a6e27e4a4dbf37bd95f4c15aaeec798245b3a2e3c767fe2f6
controller:
# -- Set the controller type.
diff --git a/dependency/redis/1.0.27/questions.yaml b/dependency/redis/1.0.28/questions.yaml
similarity index 100%
rename from dependency/redis/1.0.27/questions.yaml
rename to dependency/redis/1.0.28/questions.yaml
diff --git a/dependency/redis/1.0.27/security.md b/dependency/redis/1.0.28/security.md
similarity index 99%
rename from dependency/redis/1.0.27/security.md
rename to dependency/redis/1.0.28/security.md
index a7f387a52d9..3f0515fac34 100644
--- a/dependency/redis/1.0.27/security.md
+++ b/dependency/redis/1.0.28/security.md
@@ -36,7 +36,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/redis:v6.2.6@sha256:6e06c5501bf222c04981b36c0c0827a364e7bb803aed4c6c226666aebe91822e
+ tccr.io/truecharts/redis:v6.2.6@sha256:c20e11a71954610a6e27e4a4dbf37bd95f4c15aaeec798245b3a2e3c767fe2f6
##### Scan Results
@@ -73,7 +73,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:6e06c5501bf222c04981b36c0c0827a364e7bb803aed4c6c226666aebe91822e (debian 10.11)
+#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:c20e11a71954610a6e27e4a4dbf37bd95f4c15aaeec798245b3a2e3c767fe2f6 (debian 10.11)
**debian**
diff --git a/dependency/redis/1.0.27/templates/common.yaml b/dependency/redis/1.0.28/templates/common.yaml
similarity index 100%
rename from dependency/redis/1.0.27/templates/common.yaml
rename to dependency/redis/1.0.28/templates/common.yaml
diff --git a/dependency/redis/1.0.27/templates/health-configmap.yaml b/dependency/redis/1.0.28/templates/health-configmap.yaml
similarity index 100%
rename from dependency/redis/1.0.27/templates/health-configmap.yaml
rename to dependency/redis/1.0.28/templates/health-configmap.yaml
diff --git a/dependency/redis/1.0.27/templates/secret.yaml b/dependency/redis/1.0.28/templates/secret.yaml
similarity index 100%
rename from dependency/redis/1.0.27/templates/secret.yaml
rename to dependency/redis/1.0.28/templates/secret.yaml
diff --git a/dependency/redis/1.0.27/values.yaml b/dependency/redis/1.0.28/values.yaml
similarity index 100%
rename from dependency/redis/1.0.27/values.yaml
rename to dependency/redis/1.0.28/values.yaml
diff --git a/stable/booksonic-air/4.0.19/Chart.lock b/stable/booksonic-air/4.0.19/Chart.lock
deleted file mode 100644
index 0271b7bfe75..00000000000
--- a/stable/booksonic-air/4.0.19/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:47:40.405308261Z"
diff --git a/stable/booksonic-air/4.0.19/CHANGELOG.md b/stable/booksonic-air/4.0.20/CHANGELOG.md
similarity index 91%
rename from stable/booksonic-air/4.0.19/CHANGELOG.md
rename to stable/booksonic-air/4.0.20/CHANGELOG.md
index 75f930b656d..f5d77901702 100644
--- a/stable/booksonic-air/4.0.19/CHANGELOG.md
+++ b/stable/booksonic-air/4.0.20/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [booksonic-air-4.0.20](https://github.com/truecharts/apps/compare/booksonic-air-4.0.19...booksonic-air-4.0.20) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### booksonic-air-4.0.19 (2021-12-05)
@@ -88,12 +97,3 @@
### [booksonic-air-4.0.12](https://github.com/truecharts/apps/compare/booksonic-air-4.0.11...booksonic-air-4.0.12) (2021-11-22)
#### Chore
-
-* update non-major deps helm releases ([#1383](https://github.com/truecharts/apps/issues/1383))
-
-
-
-
-### [booksonic-air-4.0.11](https://github.com/truecharts/apps/compare/booksonic-air-4.0.10...booksonic-air-4.0.11) (2021-11-16)
-
-#### Chore
diff --git a/stable/booksonic-air/4.0.19/CONFIG.md b/stable/booksonic-air/4.0.20/CONFIG.md
similarity index 100%
rename from stable/booksonic-air/4.0.19/CONFIG.md
rename to stable/booksonic-air/4.0.20/CONFIG.md
diff --git a/stable/booksonic-air/4.0.20/Chart.lock b/stable/booksonic-air/4.0.20/Chart.lock
new file mode 100644
index 00000000000..ec5748d56fa
--- /dev/null
+++ b/stable/booksonic-air/4.0.20/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:21:51.800302818Z"
diff --git a/stable/booksonic-air/4.0.19/Chart.yaml b/stable/booksonic-air/4.0.20/Chart.yaml
similarity index 98%
rename from stable/booksonic-air/4.0.19/Chart.yaml
rename to stable/booksonic-air/4.0.20/Chart.yaml
index a3111777f89..2118faca682 100644
--- a/stable/booksonic-air/4.0.19/Chart.yaml
+++ b/stable/booksonic-air/4.0.20/Chart.yaml
@@ -20,7 +20,7 @@ name: booksonic-air
sources:
- https://github.com/popeen/Booksonic-Air
- https://hub.docker.com/r/linuxserver/booksonic-air
-version: 4.0.19
+version: 4.0.20
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/booksonic-air/4.0.19/README.md b/stable/booksonic-air/4.0.20/README.md
similarity index 100%
rename from stable/booksonic-air/4.0.19/README.md
rename to stable/booksonic-air/4.0.20/README.md
diff --git a/stable/booksonic-air/4.0.19/app-readme.md b/stable/booksonic-air/4.0.20/app-readme.md
similarity index 100%
rename from stable/booksonic-air/4.0.19/app-readme.md
rename to stable/booksonic-air/4.0.20/app-readme.md
diff --git a/stable/booksonic-air/4.0.19/charts/common-8.9.13.tgz b/stable/booksonic-air/4.0.20/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/booksonic-air/4.0.19/charts/common-8.9.13.tgz
rename to stable/booksonic-air/4.0.20/charts/common-8.9.13.tgz
diff --git a/stable/booksonic-air/4.0.19/helm-values.md b/stable/booksonic-air/4.0.20/helm-values.md
similarity index 92%
rename from stable/booksonic-air/4.0.19/helm-values.md
rename to stable/booksonic-air/4.0.20/helm-values.md
index 41c8d21b8df..1137b4a29ef 100644
--- a/stable/booksonic-air/4.0.19/helm-values.md
+++ b/stable/booksonic-air/4.0.20/helm-values.md
@@ -15,7 +15,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.TZ | string | `"UTC"` | Set the container timezone |
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
| image.repository | string | `"tccr.io/truecharts/booksonic-air"` | image repository |
-| image.tag | string | `"v2009.1.0@sha256:300d9d7d0c343daf7e5964737cfb25fb1dad5cff29ebe45076070e04c924014a"` | image tag |
+| image.tag | string | `"v2009.1.0@sha256:82747a170977685e837f4ec76d196e4a7d435371d0a4af7c7527a6bbc745e307"` | image tag |
| persistence | object | See values.yaml | Configure persistence settings for the chart under this key. |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
diff --git a/stable/booksonic-air/4.0.19/ix_values.yaml b/stable/booksonic-air/4.0.20/ix_values.yaml
similarity index 91%
rename from stable/booksonic-air/4.0.19/ix_values.yaml
rename to stable/booksonic-air/4.0.20/ix_values.yaml
index 1717dc9ea0f..38e87a8b9d9 100644
--- a/stable/booksonic-air/4.0.19/ix_values.yaml
+++ b/stable/booksonic-air/4.0.20/ix_values.yaml
@@ -4,7 +4,7 @@ image:
# -- image pull policy
pullPolicy: IfNotPresent
# -- image tag
- tag: v2009.1.0@sha256:300d9d7d0c343daf7e5964737cfb25fb1dad5cff29ebe45076070e04c924014a
+ tag: v2009.1.0@sha256:82747a170977685e837f4ec76d196e4a7d435371d0a4af7c7527a6bbc745e307
securityContext:
readOnlyRootFilesystem: false
diff --git a/stable/booksonic-air/4.0.19/questions.yaml b/stable/booksonic-air/4.0.20/questions.yaml
similarity index 100%
rename from stable/booksonic-air/4.0.19/questions.yaml
rename to stable/booksonic-air/4.0.20/questions.yaml
diff --git a/stable/booksonic-air/4.0.19/security.md b/stable/booksonic-air/4.0.20/security.md
similarity index 99%
rename from stable/booksonic-air/4.0.19/security.md
rename to stable/booksonic-air/4.0.20/security.md
index 8876b427f59..eaf72385f2c 100644
--- a/stable/booksonic-air/4.0.19/security.md
+++ b/stable/booksonic-air/4.0.20/security.md
@@ -37,7 +37,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/booksonic-air:v2009.1.0@sha256:300d9d7d0c343daf7e5964737cfb25fb1dad5cff29ebe45076070e04c924014a
+ tccr.io/truecharts/booksonic-air:v2009.1.0@sha256:82747a170977685e837f4ec76d196e4a7d435371d0a4af7c7527a6bbc745e307
##### Scan Results
@@ -74,7 +74,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/booksonic-air:v2009.1.0@sha256:300d9d7d0c343daf7e5964737cfb25fb1dad5cff29ebe45076070e04c924014a (ubuntu 18.04)
+#### Container: tccr.io/truecharts/booksonic-air:v2009.1.0@sha256:82747a170977685e837f4ec76d196e4a7d435371d0a4af7c7527a6bbc745e307 (ubuntu 18.04)
**ubuntu**
@@ -134,7 +134,7 @@ hide:
| krb5-locales | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
|
| libapparmor1 | CVE-2016-1585 | MEDIUM | 2.12-4ubuntu5.1 | | Expand...
https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libasn1-8-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libass9 | CVE-2020-36430 | MEDIUM | 1:0.14.0-1 | | Expand...
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36430
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml
https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632
|
| libavahi-client3 | CVE-2021-26720 | LOW | 0.7-3.1ubuntu1.3 | | Expand...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824
https://bugzilla.suse.com/show_bug.cgi?id=1180827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720
https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog
https://packages.debian.org/bullseye/avahi-daemon
https://packages.debian.org/buster/avahi-daemon
https://packages.debian.org/sid/avahi-daemon
https://security-tracker.debian.org/tracker/CVE-2021-26720
https://www.openwall.com/lists/oss-security/2021/02/15/2
|
| libavahi-common-data | CVE-2021-26720 | LOW | 0.7-3.1ubuntu1.3 | | Expand...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796
https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824
https://bugzilla.suse.com/show_bug.cgi?id=1180827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26720
https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog
https://packages.debian.org/bullseye/avahi-daemon
https://packages.debian.org/buster/avahi-daemon
https://packages.debian.org/sid/avahi-daemon
https://security-tracker.debian.org/tracker/CVE-2021-26720
https://www.openwall.com/lists/oss-security/2021/02/15/2
|
@@ -430,15 +430,15 @@ hide:
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libgssapi-krb5-2 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
|
| libgssapi3-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libhcrypto4-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libheimbase1-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libheimntlm0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libhx509-5-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libjack-jackd2-0 | CVE-2019-13351 | LOW | 1.9.12~dfsg-2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13351
https://github.com/jackaudio/jack2/pull/480
https://github.com/xbmc/xbmc/issues/16258
|
| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1build1 | | Expand...
http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libjpeg-turbo8 | CVE-2018-11813 | LOW | 1.5.2-0ubuntu5.18.04.4 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html
http://www.ijg.org/files/jpegsrc.v9d.tar.gz
https://access.redhat.com/errata/RHSA-2019:2052
https://bugs.gentoo.org/727908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813
https://github.com/ChijinZ/security_advisories/blob/master/libjpeg-v9c/mail.pdf
https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9c
https://linux.oracle.com/cve/CVE-2018-11813.html
https://linux.oracle.com/errata/ELSA-2019-2052.html
|
@@ -448,7 +448,7 @@ hide:
| libk5crypto3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libk5crypto3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
|
| libkrb5-26-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libkrb5-3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.2 | | Expand...
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
|
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libkrb5-3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
@@ -466,11 +466,10 @@ hide:
| libncursesw5 | CVE-2019-17595 | LOW | 6.1-1ubuntu1.18.04 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://security.gentoo.org/glsa/202101-28
|
| libnghttp2-14 | CVE-2019-9511 | MEDIUM | 1.30.0-1ubuntu1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
https://access.redhat.com/errata/RHSA-2019:2692
https://access.redhat.com/errata/RHSA-2019:2745
https://access.redhat.com/errata/RHSA-2019:2746
https://access.redhat.com/errata/RHSA-2019:2775
https://access.redhat.com/errata/RHSA-2019:2799
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2949
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:2966
https://access.redhat.com/errata/RHSA-2019:3041
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4018
https://access.redhat.com/errata/RHSA-2019:4019
https://access.redhat.com/errata/RHSA-2019:4020
https://access.redhat.com/errata/RHSA-2019:4021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://linux.oracle.com/cve/CVE-2019-9511.html
https://linux.oracle.com/errata/ELSA-2020-5862.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://seclists.org/bugtraq/2019/Aug/40
https://seclists.org/bugtraq/2019/Sep/1
https://security.netapp.com/advisory/ntap-20190823-0002/
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K02591030
https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4099-1
https://usn.ubuntu.com/4099-1/
https://www.debian.org/security/2019/dsa-4505
https://www.debian.org/security/2019/dsa-4511
https://www.debian.org/security/2020/dsa-4669
https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.synology.com/security/advisory/Synology_SA_19_33
|
| libnghttp2-14 | CVE-2019-9513 | MEDIUM | 1.30.0-1ubuntu1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
https://access.redhat.com/errata/RHSA-2019:2692
https://access.redhat.com/errata/RHSA-2019:2745
https://access.redhat.com/errata/RHSA-2019:2746
https://access.redhat.com/errata/RHSA-2019:2775
https://access.redhat.com/errata/RHSA-2019:2799
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2949
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:2966
https://access.redhat.com/errata/RHSA-2019:3041
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://linux.oracle.com/cve/CVE-2019-9513.html
https://linux.oracle.com/errata/ELSA-2019-2925.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
https://seclists.org/bugtraq/2019/Aug/40
https://seclists.org/bugtraq/2019/Sep/1
https://security.netapp.com/advisory/ntap-20190823-0002/
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K02591030
https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4099-1
https://usn.ubuntu.com/4099-1/
https://www.debian.org/security/2019/dsa-4505
https://www.debian.org/security/2019/dsa-4511
https://www.debian.org/security/2020/dsa-4669
https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_33
|
-| libnss3 | CVE-2021-43527 | HIGH | 2:3.35-2ubuntu2.12 | 2:3.35-2ubuntu2.13 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html
https://linux.oracle.com/cve/CVE-2021-43527.html
https://linux.oracle.com/errata/ELSA-2021-4904.html
https://ubuntu.com/security/notices/USN-5168-1
https://ubuntu.com/security/notices/USN-5168-2
https://ubuntu.com/security/notices/USN-5168-3
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
|
-| libnss3 | CVE-2017-11695 | LOW | 2:3.35-2ubuntu2.12 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695
https://security.gentoo.org/glsa/202003-37
|
-| libnss3 | CVE-2017-11696 | LOW | 2:3.35-2ubuntu2.12 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696
https://security.gentoo.org/glsa/202003-37
|
-| libnss3 | CVE-2017-11697 | LOW | 2:3.35-2ubuntu2.12 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697
https://security.gentoo.org/glsa/202003-37
|
-| libnss3 | CVE-2017-11698 | LOW | 2:3.35-2ubuntu2.12 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698
https://security.gentoo.org/glsa/202003-37
|
+| libnss3 | CVE-2017-11695 | LOW | 2:3.35-2ubuntu2.13 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695
https://security.gentoo.org/glsa/202003-37
|
+| libnss3 | CVE-2017-11696 | LOW | 2:3.35-2ubuntu2.13 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696
https://security.gentoo.org/glsa/202003-37
|
+| libnss3 | CVE-2017-11697 | LOW | 2:3.35-2ubuntu2.13 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697
https://security.gentoo.org/glsa/202003-37
|
+| libnss3 | CVE-2017-11698 | LOW | 2:3.35-2ubuntu2.13 | | Expand...
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698
https://security.gentoo.org/glsa/202003-37
|
| libopenjp2-7 | CVE-2018-21010 | MEDIUM | 2.3.0-2build0.18.04.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010
https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea
https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html
https://security.gentoo.org/glsa/202101-29
|
| libopenjp2-7 | CVE-2020-27814 | MEDIUM | 2.3.0-2build0.18.04.1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=1901998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814
https://github.com/uclouvain/openjpeg/issues/1283
https://linux.oracle.com/cve/CVE-2020-27814.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html
https://security.gentoo.org/glsa/202101-29
https://ubuntu.com/security/notices/USN-4685-1
https://ubuntu.com/security/notices/USN-4686-1
https://ubuntu.com/security/notices/USN-4880-1
https://www.debian.org/security/2021/dsa-4882
|
| libopenjp2-7 | CVE-2020-27845 | MEDIUM | 2.3.0-2build0.18.04.1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=1907523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845
https://linux.oracle.com/cve/CVE-2020-27845.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
https://security.gentoo.org/glsa/202101-29
https://ubuntu.com/security/notices/USN-4685-1
https://ubuntu.com/security/notices/USN-4686-1
https://ubuntu.com/security/notices/USN-4880-1
https://www.debian.org/security/2021/dsa-4882
https://www.oracle.com/security-alerts/cpuApr2021.html
|
@@ -534,7 +533,7 @@ hide:
| libpostproc54 | CVE-2020-20451 | LOW | 7:3.4.8-0ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20451
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=21265f42ecb265debe9fec1dbfd0cb7de5a8aefb
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8094
|
| libpostproc54 | CVE-2020-20453 | LOW | 7:3.4.8-0ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-20453
https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
https://trac.ffmpeg.org/ticket/8003
https://www.debian.org/security/2021/dsa-4990
https://www.debian.org/security/2021/dsa-4998
|
| libroken18-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| librsvg2-2 | CVE-2019-20446 | LOW | 2.40.20-2ubuntu0.2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446
https://gitlab.gnome.org/GNOME/librsvg/issues/515
https://linux.oracle.com/cve/CVE-2019-20446.html
https://linux.oracle.com/errata/ELSA-2020-4709.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
https://ubuntu.com/security/notices/USN-4436-1
https://ubuntu.com/security/notices/USN-4436-2
https://usn.ubuntu.com/4436-1/
|
| librsvg2-common | CVE-2019-20446 | LOW | 2.40.20-2ubuntu0.2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20446
https://gitlab.gnome.org/GNOME/librsvg/issues/515
https://linux.oracle.com/cve/CVE-2019-20446.html
https://linux.oracle.com/errata/ELSA-2020-4709.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
https://ubuntu.com/security/notices/USN-4436-1
https://ubuntu.com/security/notices/USN-4436-2
https://usn.ubuntu.com/4436-1/
|
| libsdl2-2.0-0 | CVE-2019-13626 | MEDIUM | 2.0.8+dfsg1-1ubuntu1.18.04.4 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html
https://bugzilla-attachments.libsdl.org/attachment.cgi?id=3610
https://bugzilla.libsdl.org/show_bug.cgi?id=4522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13626
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/
https://security.gentoo.org/glsa/201909-07
|
@@ -648,7 +647,7 @@ hide:
| libvorbisfile3 | CVE-2018-10392 | LOW | 1.3.5-4.2 | | Expand...
https://access.redhat.com/errata/RHSA-2019:3703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392
https://gitlab.xiph.org/xiph/vorbis/issues/2335
https://linux.oracle.com/cve/CVE-2018-10392.html
https://linux.oracle.com/errata/ELSA-2019-3703.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html
https://security.gentoo.org/glsa/202003-36
|
| libvorbisfile3 | CVE-2018-10393 | LOW | 1.3.5-4.2 | | Expand...
https://access.redhat.com/errata/RHSA-2019:3703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393
https://gitlab.xiph.org/xiph/vorbis/issues/2334
https://linux.oracle.com/cve/CVE-2018-10393.html
https://linux.oracle.com/errata/ELSA-2019-3703.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html
https://security.gentoo.org/glsa/202003-36
|
| libwind0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libzmq5 | CVE-2020-15166 | MEDIUM | 4.2.5-1ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166
https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09
https://github.com/zeromq/libzmq/pull/3913
https://github.com/zeromq/libzmq/pull/3973
https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m
https://lists.debian.org/debian-lts-announce/2020/11/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ5IMNQXDB52JFBXHFLK4AHVORFELNNG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFW2ZELCCPS4VLU4OSJOH5YL6KFKTFYW/
https://security.gentoo.org/glsa/202009-12
https://www.openwall.com/lists/oss-security/2020/09/07/3
|
| libzmq5 | CVE-2021-20235 | MEDIUM | 4.2.5-1ubuntu0.2 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=1921983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20235
https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6
|
| libzmq5 | CVE-2021-20236 | MEDIUM | 4.2.5-1ubuntu0.2 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=1921976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20236
https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
|
diff --git a/stable/booksonic-air/4.0.19/templates/common.yaml b/stable/booksonic-air/4.0.20/templates/common.yaml
similarity index 100%
rename from stable/booksonic-air/4.0.19/templates/common.yaml
rename to stable/booksonic-air/4.0.20/templates/common.yaml
diff --git a/stable/booksonic-air/4.0.19/values.yaml b/stable/booksonic-air/4.0.20/values.yaml
similarity index 100%
rename from stable/booksonic-air/4.0.19/values.yaml
rename to stable/booksonic-air/4.0.20/values.yaml
diff --git a/stable/custom-app/3.0.29/Chart.lock b/stable/custom-app/3.0.29/Chart.lock
deleted file mode 100644
index 7790393abba..00000000000
--- a/stable/custom-app/3.0.29/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:49:02.457234662Z"
diff --git a/stable/custom-app/3.0.29/ix_values.yaml b/stable/custom-app/3.0.29/ix_values.yaml
deleted file mode 100644
index 9278953b2ca..00000000000
--- a/stable/custom-app/3.0.29/ix_values.yaml
+++ /dev/null
@@ -1,4 +0,0 @@
-image:
- repository: tccr.io/truecharts/jackett
- pullPolicy: IfNotPresent
- tag: v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971
diff --git a/stable/custom-app/3.0.29/CHANGELOG.md b/stable/custom-app/3.0.30/CHANGELOG.md
similarity index 92%
rename from stable/custom-app/3.0.29/CHANGELOG.md
rename to stable/custom-app/3.0.30/CHANGELOG.md
index 0e782982a9f..20d8a01b4c7 100644
--- a/stable/custom-app/3.0.29/CHANGELOG.md
+++ b/stable/custom-app/3.0.30/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [custom-app-3.0.30](https://github.com/truecharts/apps/compare/custom-app-3.0.29...custom-app-3.0.30) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### custom-app-3.0.29 (2021-12-05)
@@ -88,12 +97,3 @@
-### [custom-app-3.0.20](https://github.com/truecharts/apps/compare/custom-app-3.0.19...custom-app-3.0.20) (2021-11-23)
-
-#### Chore
-
-* update non-major deps helm releases ([#1386](https://github.com/truecharts/apps/issues/1386))
-
-
-
-
diff --git a/stable/custom-app/3.0.29/CONFIG.md b/stable/custom-app/3.0.30/CONFIG.md
similarity index 100%
rename from stable/custom-app/3.0.29/CONFIG.md
rename to stable/custom-app/3.0.30/CONFIG.md
diff --git a/stable/custom-app/3.0.30/Chart.lock b/stable/custom-app/3.0.30/Chart.lock
new file mode 100644
index 00000000000..e27ba00bcca
--- /dev/null
+++ b/stable/custom-app/3.0.30/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:21:54.702561659Z"
diff --git a/stable/custom-app/3.0.29/Chart.yaml b/stable/custom-app/3.0.30/Chart.yaml
similarity index 94%
rename from stable/custom-app/3.0.29/Chart.yaml
rename to stable/custom-app/3.0.30/Chart.yaml
index 9d39c7a428c..2345a4cb7a9 100644
--- a/stable/custom-app/3.0.29/Chart.yaml
+++ b/stable/custom-app/3.0.30/Chart.yaml
@@ -1,5 +1,5 @@
apiVersion: v2
-appVersion: "0.20.93"
+appVersion: "0.20.95"
dependencies:
- name: common
repository: https://truecharts.org
@@ -19,7 +19,7 @@ name: custom-app
sources:
- https://github.com/truecharts/apps/tree/master/charts/stable/custom-app
type: application
-version: 3.0.29
+version: 3.0.30
annotations:
truecharts.org/catagories: |
- custom
diff --git a/stable/custom-app/3.0.29/README.md b/stable/custom-app/3.0.30/README.md
similarity index 100%
rename from stable/custom-app/3.0.29/README.md
rename to stable/custom-app/3.0.30/README.md
diff --git a/stable/custom-app/3.0.29/app-readme.md b/stable/custom-app/3.0.30/app-readme.md
similarity index 100%
rename from stable/custom-app/3.0.29/app-readme.md
rename to stable/custom-app/3.0.30/app-readme.md
diff --git a/stable/custom-app/3.0.29/charts/common-8.9.13.tgz b/stable/custom-app/3.0.30/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/custom-app/3.0.29/charts/common-8.9.13.tgz
rename to stable/custom-app/3.0.30/charts/common-8.9.13.tgz
diff --git a/stable/custom-app/3.0.29/ci/test-values.yaml b/stable/custom-app/3.0.30/ci/test-values.yaml
similarity index 88%
rename from stable/custom-app/3.0.29/ci/test-values.yaml
rename to stable/custom-app/3.0.30/ci/test-values.yaml
index 63b44d0bcc3..520db151876 100644
--- a/stable/custom-app/3.0.29/ci/test-values.yaml
+++ b/stable/custom-app/3.0.30/ci/test-values.yaml
@@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/jackett
pullPolicy: IfNotPresent
- tag: v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971
+ tag: v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2
securityContext:
readOnlyRootFilesystem: false
diff --git a/stable/custom-app/3.0.29/helm-values.md b/stable/custom-app/3.0.30/helm-values.md
similarity index 88%
rename from stable/custom-app/3.0.29/helm-values.md
rename to stable/custom-app/3.0.30/helm-values.md
index 17a223c0d1f..dfae7d3813e 100644
--- a/stable/custom-app/3.0.29/helm-values.md
+++ b/stable/custom-app/3.0.30/helm-values.md
@@ -13,6 +13,6 @@ You will, however, be able to use all values referenced in the common chart here
|-----|------|---------|-------------|
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/jackett"` | |
-| image.tag | string | `"v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971"` | |
+| image.tag | string | `"v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2"` | |
All Rights Reserved - The TrueCharts Project
diff --git a/stable/custom-app/3.0.30/ix_values.yaml b/stable/custom-app/3.0.30/ix_values.yaml
new file mode 100644
index 00000000000..acb28ccaeeb
--- /dev/null
+++ b/stable/custom-app/3.0.30/ix_values.yaml
@@ -0,0 +1,4 @@
+image:
+ repository: tccr.io/truecharts/jackett
+ pullPolicy: IfNotPresent
+ tag: v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2
diff --git a/stable/custom-app/3.0.29/questions.yaml b/stable/custom-app/3.0.30/questions.yaml
similarity index 100%
rename from stable/custom-app/3.0.29/questions.yaml
rename to stable/custom-app/3.0.30/questions.yaml
diff --git a/stable/custom-app/3.0.29/security.md b/stable/custom-app/3.0.30/security.md
similarity index 99%
rename from stable/custom-app/3.0.29/security.md
rename to stable/custom-app/3.0.30/security.md
index 7e15bdf9cc0..761b706cf95 100644
--- a/stable/custom-app/3.0.29/security.md
+++ b/stable/custom-app/3.0.30/security.md
@@ -34,7 +34,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/jackett:v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971
+ tccr.io/truecharts/jackett:v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2
##### Scan Results
@@ -71,7 +71,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/jackett:v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971 (ubuntu 20.04)
+#### Container: tccr.io/truecharts/jackett:v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2 (ubuntu 20.04)
**ubuntu**
@@ -85,7 +85,7 @@ hide:
| bind9-libs | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | Expand...
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
|
| dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| libc-bin | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
@@ -109,14 +109,14 @@ hide:
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | Expand...
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
@@ -130,12 +130,12 @@ hide:
| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | Expand...
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libpython3.8-stdlib | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | | Expand...
https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://ubuntu.com/security/notices/USN-5083-1
|
| libpython3.8-stdlib | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | | Expand...
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-1633.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
|
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| locales | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| locales | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
diff --git a/stable/custom-app/3.0.29/templates/common.yaml b/stable/custom-app/3.0.30/templates/common.yaml
similarity index 100%
rename from stable/custom-app/3.0.29/templates/common.yaml
rename to stable/custom-app/3.0.30/templates/common.yaml
diff --git a/stable/custom-app/3.0.29/values.yaml b/stable/custom-app/3.0.30/values.yaml
similarity index 100%
rename from stable/custom-app/3.0.29/values.yaml
rename to stable/custom-app/3.0.30/values.yaml
diff --git a/stable/grafana/1.0.10/Chart.lock b/stable/grafana/1.0.10/Chart.lock
deleted file mode 100644
index 5bd5d4c232f..00000000000
--- a/stable/grafana/1.0.10/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:53:40.227956537Z"
diff --git a/stable/grafana/1.0.10/CHANGELOG.md b/stable/grafana/1.0.11/CHANGELOG.md
similarity index 91%
rename from stable/grafana/1.0.10/CHANGELOG.md
rename to stable/grafana/1.0.11/CHANGELOG.md
index 8b2c679b84f..656bd3b55c8 100644
--- a/stable/grafana/1.0.10/CHANGELOG.md
+++ b/stable/grafana/1.0.11/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [grafana-1.0.11](https://github.com/truecharts/apps/compare/grafana-1.0.10...grafana-1.0.11) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### grafana-1.0.10 (2021-12-05)
@@ -88,12 +97,3 @@
* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432))
-
-
-### [grafana-1.0.2](https://github.com/truecharts/apps/compare/grafana-1.0.1...grafana-1.0.2) (2021-11-30)
-
-#### Chore
-
-* update non-major ([#1427](https://github.com/truecharts/apps/issues/1427))
-* update non-major deps helm releases
-
diff --git a/stable/grafana/1.0.10/CONFIG.md b/stable/grafana/1.0.11/CONFIG.md
similarity index 100%
rename from stable/grafana/1.0.10/CONFIG.md
rename to stable/grafana/1.0.11/CONFIG.md
diff --git a/stable/grafana/1.0.11/Chart.lock b/stable/grafana/1.0.11/Chart.lock
new file mode 100644
index 00000000000..85662149733
--- /dev/null
+++ b/stable/grafana/1.0.11/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:22:06.999717033Z"
diff --git a/stable/grafana/1.0.10/Chart.yaml b/stable/grafana/1.0.11/Chart.yaml
similarity index 98%
rename from stable/grafana/1.0.10/Chart.yaml
rename to stable/grafana/1.0.11/Chart.yaml
index d0e8dbb4feb..26ed818ff99 100644
--- a/stable/grafana/1.0.10/Chart.yaml
+++ b/stable/grafana/1.0.11/Chart.yaml
@@ -23,7 +23,7 @@ sources:
- https://github.com/bitnami/bitnami-docker-grafana
- https://grafana.com/
type: application
-version: 1.0.10
+version: 1.0.11
annotations:
truecharts.org/catagories: |
- metrics
diff --git a/stable/grafana/1.0.10/README.md b/stable/grafana/1.0.11/README.md
similarity index 100%
rename from stable/grafana/1.0.10/README.md
rename to stable/grafana/1.0.11/README.md
diff --git a/stable/grafana/1.0.10/app-readme.md b/stable/grafana/1.0.11/app-readme.md
similarity index 100%
rename from stable/grafana/1.0.10/app-readme.md
rename to stable/grafana/1.0.11/app-readme.md
diff --git a/stable/grafana/1.0.10/charts/common-8.9.13.tgz b/stable/grafana/1.0.11/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/grafana/1.0.10/charts/common-8.9.13.tgz
rename to stable/grafana/1.0.11/charts/common-8.9.13.tgz
diff --git a/stable/grafana/1.0.10/helm-values.md b/stable/grafana/1.0.11/helm-values.md
similarity index 95%
rename from stable/grafana/1.0.10/helm-values.md
rename to stable/grafana/1.0.11/helm-values.md
index 60d95f00a3e..f64d53885a4 100644
--- a/stable/grafana/1.0.10/helm-values.md
+++ b/stable/grafana/1.0.11/helm-values.md
@@ -23,7 +23,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.GF_SECURITY_ADMIN_USER | string | `"admin"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/grafana"` | |
-| image.tag | string | `"v8.3.0@sha256:77dcaed374a135f869fb8f2b9e11d1cf4c1760f9f69cfca5a62599f8baa6a81e"` | |
+| image.tag | string | `"v8.3.0@sha256:3c08270b1b96d17576f17a3c36c415fd3f2b686b9e679a98532497ad4ae3be69"` | |
| metrics.enabled | bool | See values.yaml | Enable and configure a Prometheus serviceMonitor for the chart under this key. |
| metrics.prometheusRule | object | See values.yaml | Enable and configure Prometheus Rules for the chart under this key. |
| metrics.prometheusRule.rules | list | See prometheusrules.yaml | Configure additionial rules for the chart under this key. |
diff --git a/stable/grafana/1.0.10/ix_values.yaml b/stable/grafana/1.0.11/ix_values.yaml
similarity index 95%
rename from stable/grafana/1.0.10/ix_values.yaml
rename to stable/grafana/1.0.11/ix_values.yaml
index f7206ed610e..9970e2e3a4f 100644
--- a/stable/grafana/1.0.10/ix_values.yaml
+++ b/stable/grafana/1.0.11/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/grafana
pullPolicy: IfNotPresent
- tag: v8.3.0@sha256:77dcaed374a135f869fb8f2b9e11d1cf4c1760f9f69cfca5a62599f8baa6a81e
+ tag: v8.3.0@sha256:3c08270b1b96d17576f17a3c36c415fd3f2b686b9e679a98532497ad4ae3be69
securityContext:
readOnlyRootFilesystem: false
diff --git a/stable/grafana/1.0.10/questions.yaml b/stable/grafana/1.0.11/questions.yaml
similarity index 100%
rename from stable/grafana/1.0.10/questions.yaml
rename to stable/grafana/1.0.11/questions.yaml
diff --git a/stable/grafana/1.0.10/security.md b/stable/grafana/1.0.11/security.md
similarity index 99%
rename from stable/grafana/1.0.10/security.md
rename to stable/grafana/1.0.11/security.md
index 27582f22c57..82ad7ba82f2 100644
--- a/stable/grafana/1.0.10/security.md
+++ b/stable/grafana/1.0.11/security.md
@@ -35,7 +35,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/grafana:v8.3.0@sha256:77dcaed374a135f869fb8f2b9e11d1cf4c1760f9f69cfca5a62599f8baa6a81e
+ tccr.io/truecharts/grafana:v8.3.0@sha256:3c08270b1b96d17576f17a3c36c415fd3f2b686b9e679a98532497ad4ae3be69
##### Scan Results
@@ -72,7 +72,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/grafana:v8.3.0@sha256:77dcaed374a135f869fb8f2b9e11d1cf4c1760f9f69cfca5a62599f8baa6a81e (debian 10.11)
+#### Container: tccr.io/truecharts/grafana:v8.3.0@sha256:3c08270b1b96d17576f17a3c36c415fd3f2b686b9e679a98532497ad4ae3be69 (debian 10.11)
**debian**
diff --git a/stable/grafana/1.0.10/templates/common.yaml b/stable/grafana/1.0.11/templates/common.yaml
similarity index 100%
rename from stable/grafana/1.0.10/templates/common.yaml
rename to stable/grafana/1.0.11/templates/common.yaml
diff --git a/stable/grafana/1.0.10/templates/prometheusrules.yaml b/stable/grafana/1.0.11/templates/prometheusrules.yaml
similarity index 100%
rename from stable/grafana/1.0.10/templates/prometheusrules.yaml
rename to stable/grafana/1.0.11/templates/prometheusrules.yaml
diff --git a/stable/grafana/1.0.10/templates/servicemonitor.yaml b/stable/grafana/1.0.11/templates/servicemonitor.yaml
similarity index 100%
rename from stable/grafana/1.0.10/templates/servicemonitor.yaml
rename to stable/grafana/1.0.11/templates/servicemonitor.yaml
diff --git a/stable/grafana/1.0.10/values.yaml b/stable/grafana/1.0.11/values.yaml
similarity index 100%
rename from stable/grafana/1.0.10/values.yaml
rename to stable/grafana/1.0.11/values.yaml
diff --git a/stable/jackett/9.0.38/Chart.lock b/stable/jackett/9.0.38/Chart.lock
deleted file mode 100644
index 6c442472202..00000000000
--- a/stable/jackett/9.0.38/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:54:59.253672221Z"
diff --git a/stable/jackett/9.0.38/CHANGELOG.md b/stable/jackett/9.0.39/CHANGELOG.md
similarity index 92%
rename from stable/jackett/9.0.38/CHANGELOG.md
rename to stable/jackett/9.0.39/CHANGELOG.md
index 9d3019f7b87..a2f284acb30 100644
--- a/stable/jackett/9.0.38/CHANGELOG.md
+++ b/stable/jackett/9.0.39/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [jackett-9.0.39](https://github.com/truecharts/apps/compare/jackett-9.0.38...jackett-9.0.39) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### jackett-9.0.38 (2021-12-05)
@@ -88,12 +97,3 @@
### [jackett-9.0.31](https://github.com/truecharts/apps/compare/jackett-9.0.30...jackett-9.0.31) (2021-12-04)
-#### Chore
-
-* improve a bit on security docs generation
-
-
-
-
-### [jackett-9.0.30](https://github.com/truecharts/apps/compare/jackett-9.0.28...jackett-9.0.30) (2021-12-04)
-
diff --git a/stable/jackett/9.0.38/CONFIG.md b/stable/jackett/9.0.39/CONFIG.md
similarity index 100%
rename from stable/jackett/9.0.38/CONFIG.md
rename to stable/jackett/9.0.39/CONFIG.md
diff --git a/stable/jackett/9.0.39/Chart.lock b/stable/jackett/9.0.39/Chart.lock
new file mode 100644
index 00000000000..c4654552620
--- /dev/null
+++ b/stable/jackett/9.0.39/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:22:09.033348831Z"
diff --git a/stable/jackett/9.0.38/Chart.yaml b/stable/jackett/9.0.39/Chart.yaml
similarity index 94%
rename from stable/jackett/9.0.38/Chart.yaml
rename to stable/jackett/9.0.39/Chart.yaml
index 10ed3662903..1e6557a54f4 100644
--- a/stable/jackett/9.0.38/Chart.yaml
+++ b/stable/jackett/9.0.39/Chart.yaml
@@ -1,5 +1,5 @@
apiVersion: v2
-appVersion: "0.20.93"
+appVersion: "0.20.95"
dependencies:
- name: common
repository: https://truecharts.org
@@ -21,7 +21,7 @@ name: jackett
sources:
- https://github.com/Jackett/Jackett
type: application
-version: 9.0.38
+version: 9.0.39
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/jackett/9.0.38/README.md b/stable/jackett/9.0.39/README.md
similarity index 100%
rename from stable/jackett/9.0.38/README.md
rename to stable/jackett/9.0.39/README.md
diff --git a/stable/jackett/9.0.38/app-readme.md b/stable/jackett/9.0.39/app-readme.md
similarity index 100%
rename from stable/jackett/9.0.38/app-readme.md
rename to stable/jackett/9.0.39/app-readme.md
diff --git a/stable/jackett/9.0.38/charts/common-8.9.13.tgz b/stable/jackett/9.0.39/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/jackett/9.0.38/charts/common-8.9.13.tgz
rename to stable/jackett/9.0.39/charts/common-8.9.13.tgz
diff --git a/stable/jackett/9.0.38/helm-values.md b/stable/jackett/9.0.39/helm-values.md
similarity index 92%
rename from stable/jackett/9.0.38/helm-values.md
rename to stable/jackett/9.0.39/helm-values.md
index a0c31523a20..43454786b82 100644
--- a/stable/jackett/9.0.38/helm-values.md
+++ b/stable/jackett/9.0.39/helm-values.md
@@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
| env | object | `{}` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/jackett"` | |
-| image.tag | string | `"v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971"` | |
+| image.tag | string | `"v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2"` | |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/config"` | |
| probes.liveness.path | string | `"/UI/Login"` | |
diff --git a/stable/jackett/9.0.38/ix_values.yaml b/stable/jackett/9.0.39/ix_values.yaml
similarity index 83%
rename from stable/jackett/9.0.38/ix_values.yaml
rename to stable/jackett/9.0.39/ix_values.yaml
index 326735714bd..3a0a8da3f6a 100644
--- a/stable/jackett/9.0.38/ix_values.yaml
+++ b/stable/jackett/9.0.39/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/jackett
pullPolicy: IfNotPresent
- tag: v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971
+ tag: v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2
securityContext:
readOnlyRootFilesystem: false
diff --git a/stable/jackett/9.0.38/questions.yaml b/stable/jackett/9.0.39/questions.yaml
similarity index 100%
rename from stable/jackett/9.0.38/questions.yaml
rename to stable/jackett/9.0.39/questions.yaml
diff --git a/stable/jackett/9.0.38/security.md b/stable/jackett/9.0.39/security.md
similarity index 99%
rename from stable/jackett/9.0.38/security.md
rename to stable/jackett/9.0.39/security.md
index b393ade134a..a7b55eaf2b0 100644
--- a/stable/jackett/9.0.38/security.md
+++ b/stable/jackett/9.0.39/security.md
@@ -35,7 +35,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/jackett:v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971
+ tccr.io/truecharts/jackett:v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2
##### Scan Results
@@ -72,7 +72,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/jackett:v0.20.93@sha256:93d2c4ec44668668ffeb71a8373c6a032d10fef00ba98bd7a7b5fa330839e971 (ubuntu 20.04)
+#### Container: tccr.io/truecharts/jackett:v0.20.95@sha256:473239b82d6f76618db77617c1a173432326ace0769c1ef1be2019a3a34c3bf2 (ubuntu 20.04)
**ubuntu**
@@ -86,7 +86,7 @@ hide:
| bind9-libs | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | Expand...
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
|
| dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| libc-bin | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
@@ -110,14 +110,14 @@ hide:
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | Expand...
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
@@ -131,12 +131,12 @@ hide:
| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | Expand...
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libpython3.8-stdlib | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | | Expand...
https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://ubuntu.com/security/notices/USN-5083-1
|
| libpython3.8-stdlib | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | | Expand...
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-1633.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
|
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| locales | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| locales | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
diff --git a/stable/jackett/9.0.38/templates/common.yaml b/stable/jackett/9.0.39/templates/common.yaml
similarity index 100%
rename from stable/jackett/9.0.38/templates/common.yaml
rename to stable/jackett/9.0.39/templates/common.yaml
diff --git a/stable/jackett/9.0.38/values.yaml b/stable/jackett/9.0.39/values.yaml
similarity index 100%
rename from stable/jackett/9.0.38/values.yaml
rename to stable/jackett/9.0.39/values.yaml
diff --git a/stable/kms/9.0.21/Chart.lock b/stable/kms/9.0.21/Chart.lock
deleted file mode 100644
index fbce7823bb5..00000000000
--- a/stable/kms/9.0.21/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:55:55.032424953Z"
diff --git a/stable/kms/9.0.21/CHANGELOG.md b/stable/kms/9.0.22/CHANGELOG.md
similarity index 92%
rename from stable/kms/9.0.21/CHANGELOG.md
rename to stable/kms/9.0.22/CHANGELOG.md
index da0766ddc18..e835c62a08d 100644
--- a/stable/kms/9.0.21/CHANGELOG.md
+++ b/stable/kms/9.0.22/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [kms-9.0.22](https://github.com/truecharts/apps/compare/kms-9.0.21...kms-9.0.22) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### kms-9.0.21 (2021-12-05)
@@ -88,12 +97,3 @@
### [kms-9.0.13](https://github.com/truecharts/apps/compare/kms-9.0.12...kms-9.0.13) (2021-11-22)
-#### Chore
-
-* update non-major deps helm releases ([#1383](https://github.com/truecharts/apps/issues/1383))
-
-#### Fix
-
-* Default enable all services ([#1361](https://github.com/truecharts/apps/issues/1361))
-
-
diff --git a/stable/kms/9.0.21/CONFIG.md b/stable/kms/9.0.22/CONFIG.md
similarity index 100%
rename from stable/kms/9.0.21/CONFIG.md
rename to stable/kms/9.0.22/CONFIG.md
diff --git a/stable/kms/9.0.22/Chart.lock b/stable/kms/9.0.22/Chart.lock
new file mode 100644
index 00000000000..fbc36747d48
--- /dev/null
+++ b/stable/kms/9.0.22/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:22:16.895337576Z"
diff --git a/stable/kms/9.0.21/Chart.yaml b/stable/kms/9.0.22/Chart.yaml
similarity index 97%
rename from stable/kms/9.0.21/Chart.yaml
rename to stable/kms/9.0.22/Chart.yaml
index 797d8a8959c..9784b90e775 100644
--- a/stable/kms/9.0.21/Chart.yaml
+++ b/stable/kms/9.0.22/Chart.yaml
@@ -19,7 +19,7 @@ name: kms
sources:
- https://github.com/SystemRage/py-kms
type: application
-version: 9.0.21
+version: 9.0.22
annotations:
truecharts.org/catagories: |
- graywares
diff --git a/stable/kms/9.0.21/README.md b/stable/kms/9.0.22/README.md
similarity index 100%
rename from stable/kms/9.0.21/README.md
rename to stable/kms/9.0.22/README.md
diff --git a/stable/kms/9.0.21/app-readme.md b/stable/kms/9.0.22/app-readme.md
similarity index 100%
rename from stable/kms/9.0.21/app-readme.md
rename to stable/kms/9.0.22/app-readme.md
diff --git a/stable/kms/9.0.21/charts/common-8.9.13.tgz b/stable/kms/9.0.22/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/kms/9.0.21/charts/common-8.9.13.tgz
rename to stable/kms/9.0.22/charts/common-8.9.13.tgz
diff --git a/stable/kms/9.0.21/helm-values.md b/stable/kms/9.0.22/helm-values.md
similarity index 91%
rename from stable/kms/9.0.21/helm-values.md
rename to stable/kms/9.0.22/helm-values.md
index 608b711244b..8cf17ad1d2e 100644
--- a/stable/kms/9.0.21/helm-values.md
+++ b/stable/kms/9.0.22/helm-values.md
@@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here
|-----|------|---------|-------------|
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/kms"` | |
-| image.tag | string | `"vminimal@sha256:12ddbd5ecfc53a1e6bb2c61d628a407967937a030508494eff508dbc0f4e6b19"` | |
+| image.tag | string | `"vminimal@sha256:d576d1cd121661b473782aa5acbf4d19bb153068a2eb9b6017bd5f533e4ce73a"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
diff --git a/stable/kms/9.0.21/ix_values.yaml b/stable/kms/9.0.22/ix_values.yaml
similarity index 76%
rename from stable/kms/9.0.21/ix_values.yaml
rename to stable/kms/9.0.22/ix_values.yaml
index 5cea6fb02bb..76330bff199 100644
--- a/stable/kms/9.0.21/ix_values.yaml
+++ b/stable/kms/9.0.22/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/kms
pullPolicy: IfNotPresent
- tag: vminimal@sha256:12ddbd5ecfc53a1e6bb2c61d628a407967937a030508494eff508dbc0f4e6b19
+ tag: vminimal@sha256:d576d1cd121661b473782aa5acbf4d19bb153068a2eb9b6017bd5f533e4ce73a
securityContext:
readOnlyRootFilesystem: false
diff --git a/stable/kms/9.0.21/questions.yaml b/stable/kms/9.0.22/questions.yaml
similarity index 100%
rename from stable/kms/9.0.21/questions.yaml
rename to stable/kms/9.0.22/questions.yaml
diff --git a/stable/kms/9.0.21/security.md b/stable/kms/9.0.22/security.md
similarity index 99%
rename from stable/kms/9.0.21/security.md
rename to stable/kms/9.0.22/security.md
index aea632d8fff..c4416a87732 100644
--- a/stable/kms/9.0.21/security.md
+++ b/stable/kms/9.0.22/security.md
@@ -37,7 +37,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/kms:vminimal@sha256:12ddbd5ecfc53a1e6bb2c61d628a407967937a030508494eff508dbc0f4e6b19
+ tccr.io/truecharts/kms:vminimal@sha256:d576d1cd121661b473782aa5acbf4d19bb153068a2eb9b6017bd5f533e4ce73a
##### Scan Results
@@ -74,7 +74,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/kms:vminimal@sha256:12ddbd5ecfc53a1e6bb2c61d628a407967937a030508494eff508dbc0f4e6b19 (alpine 3.14.3)
+#### Container: tccr.io/truecharts/kms:vminimal@sha256:d576d1cd121661b473782aa5acbf4d19bb153068a2eb9b6017bd5f533e4ce73a (alpine 3.14.3)
**alpine**
diff --git a/stable/kms/9.0.21/templates/common.yaml b/stable/kms/9.0.22/templates/common.yaml
similarity index 100%
rename from stable/kms/9.0.21/templates/common.yaml
rename to stable/kms/9.0.22/templates/common.yaml
diff --git a/stable/kms/9.0.21/values.yaml b/stable/kms/9.0.22/values.yaml
similarity index 100%
rename from stable/kms/9.0.21/values.yaml
rename to stable/kms/9.0.22/values.yaml
diff --git a/stable/komga/4.0.23/Chart.lock b/stable/komga/4.0.23/Chart.lock
deleted file mode 100644
index 16e36a1a8e2..00000000000
--- a/stable/komga/4.0.23/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:56:04.367146584Z"
diff --git a/stable/komga/4.0.23/CHANGELOG.md b/stable/komga/4.0.24/CHANGELOG.md
similarity index 92%
rename from stable/komga/4.0.23/CHANGELOG.md
rename to stable/komga/4.0.24/CHANGELOG.md
index 7d8a2962528..31c32d60265 100644
--- a/stable/komga/4.0.23/CHANGELOG.md
+++ b/stable/komga/4.0.24/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [komga-4.0.24](https://github.com/truecharts/apps/compare/komga-4.0.23...komga-4.0.24) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### komga-4.0.23 (2021-12-05)
@@ -88,12 +97,3 @@
### [komga-4.0.14](https://github.com/truecharts/apps/compare/komga-4.0.13...komga-4.0.14) (2021-11-22)
-
-#### Chore
-
-* update non-major deps helm releases ([#1383](https://github.com/truecharts/apps/issues/1383))
-
-
-
-
-### [komga-4.0.13](https://github.com/truecharts/apps/compare/komga-4.0.12...komga-4.0.13) (2021-11-22)
diff --git a/stable/komga/4.0.23/CONFIG.md b/stable/komga/4.0.24/CONFIG.md
similarity index 100%
rename from stable/komga/4.0.23/CONFIG.md
rename to stable/komga/4.0.24/CONFIG.md
diff --git a/stable/komga/4.0.24/Chart.lock b/stable/komga/4.0.24/Chart.lock
new file mode 100644
index 00000000000..1ede20b708f
--- /dev/null
+++ b/stable/komga/4.0.24/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:22:26.031401025Z"
diff --git a/stable/komga/4.0.23/Chart.yaml b/stable/komga/4.0.24/Chart.yaml
similarity index 94%
rename from stable/komga/4.0.23/Chart.yaml
rename to stable/komga/4.0.24/Chart.yaml
index f7c897d7ce0..2d5256371e9 100644
--- a/stable/komga/4.0.23/Chart.yaml
+++ b/stable/komga/4.0.24/Chart.yaml
@@ -1,5 +1,5 @@
apiVersion: v2
-appVersion: "0.134.0"
+appVersion: "0.134.1"
dependencies:
- name: common
repository: https://truecharts.org
@@ -21,7 +21,7 @@ name: komga
sources:
- https://komga.org/
- https://github.com/gotson/komga
-version: 4.0.23
+version: 4.0.24
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/komga/4.0.23/README.md b/stable/komga/4.0.24/README.md
similarity index 100%
rename from stable/komga/4.0.23/README.md
rename to stable/komga/4.0.24/README.md
diff --git a/stable/komga/4.0.23/app-readme.md b/stable/komga/4.0.24/app-readme.md
similarity index 100%
rename from stable/komga/4.0.23/app-readme.md
rename to stable/komga/4.0.24/app-readme.md
diff --git a/stable/komga/4.0.23/charts/common-8.9.13.tgz b/stable/komga/4.0.24/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/komga/4.0.23/charts/common-8.9.13.tgz
rename to stable/komga/4.0.24/charts/common-8.9.13.tgz
diff --git a/stable/komga/4.0.23/helm-values.md b/stable/komga/4.0.24/helm-values.md
similarity index 91%
rename from stable/komga/4.0.23/helm-values.md
rename to stable/komga/4.0.24/helm-values.md
index 19f0976ded5..1110fefb1bc 100644
--- a/stable/komga/4.0.23/helm-values.md
+++ b/stable/komga/4.0.24/helm-values.md
@@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
| env | object | See below | environment variables. See more environment variables in the [komga documentation](https://komga.org/installation/configuration.html#optional-configuration). |
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
| image.repository | string | `"tccr.io/truecharts/komga"` | image repository |
-| image.tag | string | `"v0.134.0@sha256:b38ff9fd6502fe1272adef4d8b0780e3164ed32a4ccac21ada0912a1cc4a16e1"` | image tag |
+| image.tag | string | `"v0.134.1@sha256:3a34cf611a0d67026e2c1755cf6d806ea31e3acfeaadfc1a3c66d0c8f75008a3"` | image tag |
| persistence | object | See values.yaml | Configure persistence settings for the chart under this key. |
| service | object | See values.yaml | Configures service settings for the chart. |
diff --git a/stable/komga/4.0.23/ix_values.yaml b/stable/komga/4.0.24/ix_values.yaml
similarity index 88%
rename from stable/komga/4.0.23/ix_values.yaml
rename to stable/komga/4.0.24/ix_values.yaml
index 2abfdcf0451..f5a18b074ba 100644
--- a/stable/komga/4.0.23/ix_values.yaml
+++ b/stable/komga/4.0.24/ix_values.yaml
@@ -2,7 +2,7 @@ image:
# -- image repository
repository: tccr.io/truecharts/komga
# -- image tag
- tag: v0.134.0@sha256:b38ff9fd6502fe1272adef4d8b0780e3164ed32a4ccac21ada0912a1cc4a16e1
+ tag: v0.134.1@sha256:3a34cf611a0d67026e2c1755cf6d806ea31e3acfeaadfc1a3c66d0c8f75008a3
# -- image pull policy
pullPolicy: IfNotPresent
diff --git a/stable/komga/4.0.23/questions.yaml b/stable/komga/4.0.24/questions.yaml
similarity index 100%
rename from stable/komga/4.0.23/questions.yaml
rename to stable/komga/4.0.24/questions.yaml
diff --git a/stable/komga/4.0.23/security.md b/stable/komga/4.0.24/security.md
similarity index 99%
rename from stable/komga/4.0.23/security.md
rename to stable/komga/4.0.24/security.md
index ffb2e45044d..bf08fb677c7 100644
--- a/stable/komga/4.0.23/security.md
+++ b/stable/komga/4.0.24/security.md
@@ -34,7 +34,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/komga:v0.134.0@sha256:b38ff9fd6502fe1272adef4d8b0780e3164ed32a4ccac21ada0912a1cc4a16e1
+ tccr.io/truecharts/komga:v0.134.1@sha256:3a34cf611a0d67026e2c1755cf6d806ea31e3acfeaadfc1a3c66d0c8f75008a3
##### Scan Results
@@ -71,7 +71,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/komga:v0.134.0@sha256:b38ff9fd6502fe1272adef4d8b0780e3164ed32a4ccac21ada0912a1cc4a16e1 (ubuntu 18.04)
+#### Container: tccr.io/truecharts/komga:v0.134.1@sha256:3a34cf611a0d67026e2c1755cf6d806ea31e3acfeaadfc1a3c66d0c8f75008a3 (ubuntu 18.04)
**ubuntu**
@@ -95,7 +95,7 @@ hide:
| gpgv | CVE-2019-13050 | LOW | 2.2.4-1ubuntu1.3 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS
https://twitter.com/lambdafu/status/1147162583969009664
|
| libapt-pkg5.0 | CVE-2020-27350 | MEDIUM | 1.6.12ubuntu0.1 | 1.6.12ubuntu0.2 | Expand...
https://bugs.launchpad.net/bugs/1899193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27350
https://security.netapp.com/advisory/ntap-20210108-0005/
https://ubuntu.com/security/notices/USN-4667-1
https://ubuntu.com/security/notices/USN-4667-2
https://usn.ubuntu.com/usn/usn-4667-1
https://www.debian.org/security/2020/dsa-4808
|
| libasn1-8-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libc-bin | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| libc-bin | CVE-2021-38604 | MEDIUM | 2.27-3ubuntu1.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| libc-bin | CVE-2009-5155 | LOW | 2.27-3ubuntu1.2 | | Expand...
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
|
@@ -138,25 +138,25 @@ hide:
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libgssapi-krb5-2 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
|
| libgssapi3-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libhcrypto4-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libheimbase1-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libheimntlm0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libhogweed4 | CVE-2021-20305 | MEDIUM | 3.4-1 | 3.4-1ubuntu0.1 | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=1942533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
https://linux.oracle.com/cve/CVE-2021-20305.html
https://linux.oracle.com/errata/ELSA-2021-1206.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/
https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html
https://security.gentoo.org/glsa/202105-31
https://security.netapp.com/advisory/ntap-20211022-0002/
https://ubuntu.com/security/notices/USN-4906-1
https://www.debian.org/security/2021/dsa-4933
|
| libhogweed4 | CVE-2021-3580 | MEDIUM | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2021-4451.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
|
| libhogweed4 | CVE-2018-16869 | LOW | 3.4-1 | 3.4.1-0ubuntu0.18.04.1 | Expand...
http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://ubuntu.com/security/notices/USN-4990-1
|
| libhx509-5-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libk5crypto3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.1 | | Expand...
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
|
| libk5crypto3 | CVE-2020-28196 | MEDIUM | 1.16-2ubuntu0.1 | 1.16-2ubuntu0.2 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libk5crypto3 | CVE-2018-5709 | LOW | 1.16-2ubuntu0.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libk5crypto3 | CVE-2018-5710 | LOW | 1.16-2ubuntu0.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Denial%20Of%20Service(DoS)
|
| libkrb5-26-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libkrb5-3 | CVE-2018-20217 | MEDIUM | 1.16-2ubuntu0.1 | | Expand...
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
https://security.netapp.com/advisory/ntap-20190416-0006/
|
| libkrb5-3 | CVE-2020-28196 | MEDIUM | 1.16-2ubuntu0.1 | 1.16-2ubuntu0.2 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.16-2ubuntu0.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
@@ -213,7 +213,7 @@ hide:
| libpcre3 | CVE-2020-14155 | LOW | 2:8.39-9 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://www.pcre.org/original/changelog.txt
|
| libpng16-16 | CVE-2018-14048 | LOW | 1.6.34-1ubuntu0.18.04.2 | | Expand...
http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14048
https://github.com/fouzhe/security/tree/master/libpng
https://github.com/glennrp/libpng/issues/238
https://seclists.org/bugtraq/2019/Apr/30
https://security.gentoo.org/glsa/201908-02
|
| libroken18-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libroken18-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.22.0-1ubuntu0.4 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
|
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.22.0-1ubuntu0.4 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.22.0-1ubuntu0.4 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
@@ -232,7 +232,7 @@ hide:
| libudev1 | CVE-2021-33910 | HIGH | 237-3ubuntu10.42 | 237-3ubuntu10.49 | Expand...
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
|
| libudev1 | CVE-2020-13529 | LOW | 237-3ubuntu10.42 | 237-3ubuntu10.49 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
|
| libwind0-heimdal | CVE-2019-12098 | LOW | 7.5.0+dfsg-1 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
https://seclists.org/bugtraq/2019/Jun/1
https://www.debian.org/security/2019/dsa-4455
|
-| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libwind0-heimdal | CVE-2021-3671 | LOW | 7.5.0+dfsg-1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libzstd1 | CVE-2021-24031 | MEDIUM | 1.3.3+dfsg-2ubuntu1.1 | 1.3.3+dfsg-2ubuntu1.2 | Expand...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24031
https://github.com/facebook/zstd/issues/1630
https://ubuntu.com/security/notices/USN-4760-1
https://www.facebook.com/security/advisories/cve-2021-24031
|
| libzstd1 | CVE-2021-24032 | MEDIUM | 1.3.3+dfsg-2ubuntu1.1 | 1.3.3+dfsg-2ubuntu1.2 | Expand...
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24032
https://github.com/facebook/zstd/issues/2491
https://ubuntu.com/security/notices/USN-4760-1
https://www.facebook.com/security/advisories/cve-2021-24032
|
| locales | CVE-2021-35942 | MEDIUM | 2.27-3ubuntu1.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
diff --git a/stable/komga/4.0.23/templates/common.yaml b/stable/komga/4.0.24/templates/common.yaml
similarity index 100%
rename from stable/komga/4.0.23/templates/common.yaml
rename to stable/komga/4.0.24/templates/common.yaml
diff --git a/stable/komga/4.0.23/values.yaml b/stable/komga/4.0.24/values.yaml
similarity index 100%
rename from stable/komga/4.0.23/values.yaml
rename to stable/komga/4.0.24/values.yaml
diff --git a/stable/littlelink/4.0.26/Chart.lock b/stable/littlelink/4.0.26/Chart.lock
deleted file mode 100644
index 6a5b7c53ef2..00000000000
--- a/stable/littlelink/4.0.26/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:57:04.112473674Z"
diff --git a/stable/littlelink/4.0.26/CHANGELOG.md b/stable/littlelink/4.0.27/CHANGELOG.md
similarity index 92%
rename from stable/littlelink/4.0.26/CHANGELOG.md
rename to stable/littlelink/4.0.27/CHANGELOG.md
index ea0b5afde65..a1ac8d1ca87 100644
--- a/stable/littlelink/4.0.26/CHANGELOG.md
+++ b/stable/littlelink/4.0.27/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [littlelink-4.0.27](https://github.com/truecharts/apps/compare/littlelink-4.0.26...littlelink-4.0.27) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### littlelink-4.0.26 (2021-12-05)
@@ -88,12 +97,3 @@
### [littlelink-4.0.17](https://github.com/truecharts/apps/compare/littlelink-4.0.16...littlelink-4.0.17) (2021-11-23)
-
-#### Chore
-
-* update non-major ([#1384](https://github.com/truecharts/apps/issues/1384))
-
-
-
-
-### [littlelink-4.0.16](https://github.com/truecharts/apps/compare/littlelink-4.0.15...littlelink-4.0.16) (2021-11-22)
diff --git a/stable/littlelink/4.0.26/CONFIG.md b/stable/littlelink/4.0.27/CONFIG.md
similarity index 100%
rename from stable/littlelink/4.0.26/CONFIG.md
rename to stable/littlelink/4.0.27/CONFIG.md
diff --git a/stable/littlelink/4.0.27/Chart.lock b/stable/littlelink/4.0.27/Chart.lock
new file mode 100644
index 00000000000..314b7cd6375
--- /dev/null
+++ b/stable/littlelink/4.0.27/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:22:34.884256193Z"
diff --git a/stable/littlelink/4.0.26/Chart.yaml b/stable/littlelink/4.0.27/Chart.yaml
similarity index 97%
rename from stable/littlelink/4.0.26/Chart.yaml
rename to stable/littlelink/4.0.27/Chart.yaml
index 9aca44af2ed..6f5346da662 100644
--- a/stable/littlelink/4.0.26/Chart.yaml
+++ b/stable/littlelink/4.0.27/Chart.yaml
@@ -20,7 +20,7 @@ sources:
- https://github.com/techno-tim/littlelink-server
- https://github.com/sethcottle/littlelink
type: application
-version: 4.0.26
+version: 4.0.27
annotations:
truecharts.org/catagories: |
- social
diff --git a/stable/littlelink/4.0.26/README.md b/stable/littlelink/4.0.27/README.md
similarity index 100%
rename from stable/littlelink/4.0.26/README.md
rename to stable/littlelink/4.0.27/README.md
diff --git a/stable/littlelink/4.0.26/app-readme.md b/stable/littlelink/4.0.27/app-readme.md
similarity index 100%
rename from stable/littlelink/4.0.26/app-readme.md
rename to stable/littlelink/4.0.27/app-readme.md
diff --git a/stable/littlelink/4.0.26/charts/common-8.9.13.tgz b/stable/littlelink/4.0.27/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/littlelink/4.0.26/charts/common-8.9.13.tgz
rename to stable/littlelink/4.0.27/charts/common-8.9.13.tgz
diff --git a/stable/littlelink/4.0.26/helm-values.md b/stable/littlelink/4.0.27/helm-values.md
similarity index 95%
rename from stable/littlelink/4.0.26/helm-values.md
rename to stable/littlelink/4.0.27/helm-values.md
index dfaeb94cf02..2556e6b49ee 100644
--- a/stable/littlelink/4.0.26/helm-values.md
+++ b/stable/littlelink/4.0.27/helm-values.md
@@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
| envFrom[0].configMapRef.name | string | `"littlelinkconfig"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/littlelink-server"` | |
-| image.tag | string | `"latest@sha256:29d95d1d215342d2e627a082b0049116c627781517b3626a8afd9af97f26b605"` | |
+| image.tag | string | `"latest@sha256:8fb4a4b97c6bbc148c4c080ecca40392623e0591b47af20f9369e09928fb0f24"` | |
| littlelink.avatar_2x_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_400x400.jpg"` | |
| littlelink.avatar_alt | string | `"techno tim profile pic"` | |
| littlelink.avatar_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_200x200.jpg"` | |
diff --git a/stable/littlelink/4.0.26/ix_values.yaml b/stable/littlelink/4.0.27/ix_values.yaml
similarity index 93%
rename from stable/littlelink/4.0.26/ix_values.yaml
rename to stable/littlelink/4.0.27/ix_values.yaml
index b6702ac7552..bdd09c572f0 100644
--- a/stable/littlelink/4.0.26/ix_values.yaml
+++ b/stable/littlelink/4.0.27/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/littlelink-server
pullPolicy: IfNotPresent
- tag: latest@sha256:29d95d1d215342d2e627a082b0049116c627781517b3626a8afd9af97f26b605
+ tag: latest@sha256:8fb4a4b97c6bbc148c4c080ecca40392623e0591b47af20f9369e09928fb0f24
service:
main:
diff --git a/stable/littlelink/4.0.26/questions.yaml b/stable/littlelink/4.0.27/questions.yaml
similarity index 100%
rename from stable/littlelink/4.0.26/questions.yaml
rename to stable/littlelink/4.0.27/questions.yaml
diff --git a/stable/littlelink/4.0.26/security.md b/stable/littlelink/4.0.27/security.md
similarity index 99%
rename from stable/littlelink/4.0.26/security.md
rename to stable/littlelink/4.0.27/security.md
index cc319383845..0f8c2cc19f4 100644
--- a/stable/littlelink/4.0.26/security.md
+++ b/stable/littlelink/4.0.27/security.md
@@ -34,7 +34,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/littlelink-server:latest@sha256:29d95d1d215342d2e627a082b0049116c627781517b3626a8afd9af97f26b605
+ tccr.io/truecharts/littlelink-server:latest@sha256:8fb4a4b97c6bbc148c4c080ecca40392623e0591b47af20f9369e09928fb0f24
##### Scan Results
@@ -71,7 +71,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:29d95d1d215342d2e627a082b0049116c627781517b3626a8afd9af97f26b605 (alpine 3.14.3)
+#### Container: tccr.io/truecharts/littlelink-server:latest@sha256:8fb4a4b97c6bbc148c4c080ecca40392623e0591b47af20f9369e09928fb0f24 (alpine 3.14.3)
**alpine**
diff --git a/stable/littlelink/4.0.26/templates/_configmap.tpl b/stable/littlelink/4.0.27/templates/_configmap.tpl
similarity index 100%
rename from stable/littlelink/4.0.26/templates/_configmap.tpl
rename to stable/littlelink/4.0.27/templates/_configmap.tpl
diff --git a/stable/littlelink/4.0.26/templates/common.yaml b/stable/littlelink/4.0.27/templates/common.yaml
similarity index 100%
rename from stable/littlelink/4.0.26/templates/common.yaml
rename to stable/littlelink/4.0.27/templates/common.yaml
diff --git a/stable/littlelink/4.0.26/values.yaml b/stable/littlelink/4.0.27/values.yaml
similarity index 100%
rename from stable/littlelink/4.0.26/values.yaml
rename to stable/littlelink/4.0.27/values.yaml
diff --git a/stable/nzbhydra/9.0.20/Chart.lock b/stable/nzbhydra/9.0.20/Chart.lock
deleted file mode 100644
index aef6c54e2b7..00000000000
--- a/stable/nzbhydra/9.0.20/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T22:59:37.138396606Z"
diff --git a/stable/nzbhydra/9.0.20/CHANGELOG.md b/stable/nzbhydra/9.0.21/CHANGELOG.md
similarity index 91%
rename from stable/nzbhydra/9.0.20/CHANGELOG.md
rename to stable/nzbhydra/9.0.21/CHANGELOG.md
index fa721d1db38..76a6313a8df 100644
--- a/stable/nzbhydra/9.0.20/CHANGELOG.md
+++ b/stable/nzbhydra/9.0.21/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [nzbhydra-9.0.21](https://github.com/truecharts/apps/compare/nzbhydra-9.0.20...nzbhydra-9.0.21) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### nzbhydra-9.0.20 (2021-12-05)
@@ -88,12 +97,3 @@
### [nzbhydra-9.0.11](https://github.com/truecharts/apps/compare/nzbhydra-9.0.10...nzbhydra-9.0.11) (2021-11-22)
#### Chore
-
-* update non-major deps helm releases ([#1383](https://github.com/truecharts/apps/issues/1383))
-
-
-
-
-### [nzbhydra-9.0.10](https://github.com/truecharts/apps/compare/nzbhydra-9.0.9...nzbhydra-9.0.10) (2021-11-16)
-
-#### Chore
diff --git a/stable/nzbhydra/9.0.20/CONFIG.md b/stable/nzbhydra/9.0.21/CONFIG.md
similarity index 100%
rename from stable/nzbhydra/9.0.20/CONFIG.md
rename to stable/nzbhydra/9.0.21/CONFIG.md
diff --git a/stable/nzbhydra/9.0.21/Chart.lock b/stable/nzbhydra/9.0.21/Chart.lock
new file mode 100644
index 00000000000..5e1f6a1bcfd
--- /dev/null
+++ b/stable/nzbhydra/9.0.21/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:22:36.581528766Z"
diff --git a/stable/nzbhydra/9.0.20/Chart.yaml b/stable/nzbhydra/9.0.21/Chart.yaml
similarity index 94%
rename from stable/nzbhydra/9.0.20/Chart.yaml
rename to stable/nzbhydra/9.0.21/Chart.yaml
index fe700375463..a90959a460f 100644
--- a/stable/nzbhydra/9.0.20/Chart.yaml
+++ b/stable/nzbhydra/9.0.21/Chart.yaml
@@ -1,5 +1,5 @@
apiVersion: v2
-appVersion: "3.18.1"
+appVersion: "3.18.2"
dependencies:
- name: common
repository: https://truecharts.org
@@ -17,7 +17,7 @@ name: nzbhydra
sources:
- https://github.com/theotherp/nzbhydra2
type: application
-version: 9.0.20
+version: 9.0.21
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/nzbhydra/9.0.20/README.md b/stable/nzbhydra/9.0.21/README.md
similarity index 100%
rename from stable/nzbhydra/9.0.20/README.md
rename to stable/nzbhydra/9.0.21/README.md
diff --git a/stable/nzbhydra/9.0.20/app-readme.md b/stable/nzbhydra/9.0.21/app-readme.md
similarity index 100%
rename from stable/nzbhydra/9.0.20/app-readme.md
rename to stable/nzbhydra/9.0.21/app-readme.md
diff --git a/stable/nzbhydra/9.0.20/charts/common-8.9.13.tgz b/stable/nzbhydra/9.0.21/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/nzbhydra/9.0.20/charts/common-8.9.13.tgz
rename to stable/nzbhydra/9.0.21/charts/common-8.9.13.tgz
diff --git a/stable/nzbhydra/9.0.20/helm-values.md b/stable/nzbhydra/9.0.21/helm-values.md
similarity index 95%
rename from stable/nzbhydra/9.0.20/helm-values.md
rename to stable/nzbhydra/9.0.21/helm-values.md
index 9bbc1deac6c..0bb8a1f4955 100644
--- a/stable/nzbhydra/9.0.20/helm-values.md
+++ b/stable/nzbhydra/9.0.21/helm-values.md
@@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
| env | object | `{}` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/nzbhydra2"` | |
-| image.tag | string | `"v3.18.1@sha256:49f70e9135edc8afcc3343569f7d6dbc4b693012f502ed70783241b975990ef6"` | |
+| image.tag | string | `"v3.18.2@sha256:917d06d004420ce5bb42aa1e02b19d4f0a909de7a646517eea3c9fa6f2aaa1cf"` | |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/config"` | |
| probes.liveness.custom | bool | `true` | |
diff --git a/stable/nzbhydra/9.0.20/ix_values.yaml b/stable/nzbhydra/9.0.21/ix_values.yaml
similarity index 92%
rename from stable/nzbhydra/9.0.20/ix_values.yaml
rename to stable/nzbhydra/9.0.21/ix_values.yaml
index c8a31fa41d8..e27d8d92d7e 100644
--- a/stable/nzbhydra/9.0.20/ix_values.yaml
+++ b/stable/nzbhydra/9.0.21/ix_values.yaml
@@ -1,7 +1,7 @@
image:
repository: tccr.io/truecharts/nzbhydra2
pullPolicy: IfNotPresent
- tag: v3.18.1@sha256:49f70e9135edc8afcc3343569f7d6dbc4b693012f502ed70783241b975990ef6
+ tag: v3.18.2@sha256:917d06d004420ce5bb42aa1e02b19d4f0a909de7a646517eea3c9fa6f2aaa1cf
securityContext:
readOnlyRootFilesystem: false
diff --git a/stable/nzbhydra/9.0.20/questions.yaml b/stable/nzbhydra/9.0.21/questions.yaml
similarity index 100%
rename from stable/nzbhydra/9.0.20/questions.yaml
rename to stable/nzbhydra/9.0.21/questions.yaml
diff --git a/stable/nzbhydra/9.0.20/security.md b/stable/nzbhydra/9.0.21/security.md
similarity index 99%
rename from stable/nzbhydra/9.0.20/security.md
rename to stable/nzbhydra/9.0.21/security.md
index 79a11481364..c7aa0f32301 100644
--- a/stable/nzbhydra/9.0.20/security.md
+++ b/stable/nzbhydra/9.0.21/security.md
@@ -35,7 +35,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/nzbhydra2:v3.18.1@sha256:49f70e9135edc8afcc3343569f7d6dbc4b693012f502ed70783241b975990ef6
+ tccr.io/truecharts/nzbhydra2:v3.18.2@sha256:917d06d004420ce5bb42aa1e02b19d4f0a909de7a646517eea3c9fa6f2aaa1cf
##### Scan Results
@@ -72,7 +72,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/nzbhydra2:v3.18.1@sha256:49f70e9135edc8afcc3343569f7d6dbc4b693012f502ed70783241b975990ef6 (ubuntu 20.04)
+#### Container: tccr.io/truecharts/nzbhydra2:v3.18.2@sha256:917d06d004420ce5bb42aa1e02b19d4f0a909de7a646517eea3c9fa6f2aaa1cf (ubuntu 20.04)
**ubuntu**
@@ -86,7 +86,7 @@ hide:
| bind9-libs | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | Expand...
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
|
| dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| libc-bin | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
@@ -113,16 +113,16 @@ hide:
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | Expand...
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libicu66 | CVE-2021-30535 | MEDIUM | 66.1-2ubuntu2 | 66.1-2ubuntu2.1 | Expand...
https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
https://crbug.com/1194899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535
https://github.com/unicode-org/icu/pull/1698
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/
https://ubuntu.com/security/notices/USN-5156-1
|
| libjpeg-turbo8 | CVE-2020-17541 | LOW | 2.0.3-0ubuntu1.20.04.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
|
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
@@ -137,12 +137,12 @@ hide:
| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | Expand...
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libpython3.8-stdlib | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | | Expand...
https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://ubuntu.com/security/notices/USN-5083-1
|
| libpython3.8-stdlib | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | | Expand...
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-1633.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
|
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| locales | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| locales | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
diff --git a/stable/nzbhydra/9.0.20/templates/common.yaml b/stable/nzbhydra/9.0.21/templates/common.yaml
similarity index 100%
rename from stable/nzbhydra/9.0.20/templates/common.yaml
rename to stable/nzbhydra/9.0.21/templates/common.yaml
diff --git a/stable/nzbhydra/9.0.20/values.yaml b/stable/nzbhydra/9.0.21/values.yaml
similarity index 100%
rename from stable/nzbhydra/9.0.20/values.yaml
rename to stable/nzbhydra/9.0.21/values.yaml
diff --git a/stable/prowlarr/4.0.29/Chart.lock b/stable/prowlarr/4.0.29/Chart.lock
deleted file mode 100644
index 625378733c9..00000000000
--- a/stable/prowlarr/4.0.29/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 8.9.13
-digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-05T23:03:41.909363866Z"
diff --git a/stable/prowlarr/4.0.29/CHANGELOG.md b/stable/prowlarr/4.0.30/CHANGELOG.md
similarity index 89%
rename from stable/prowlarr/4.0.29/CHANGELOG.md
rename to stable/prowlarr/4.0.30/CHANGELOG.md
index 661115e1097..7b1c0e909a9 100644
--- a/stable/prowlarr/4.0.29/CHANGELOG.md
+++ b/stable/prowlarr/4.0.30/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [prowlarr-4.0.30](https://github.com/truecharts/apps/compare/prowlarr-4.0.29...prowlarr-4.0.30) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### prowlarr-4.0.29 (2021-12-05)
@@ -88,12 +97,3 @@
-
-### [prowlarr-4.0.21](https://github.com/truecharts/apps/compare/prowlarr-4.0.20...prowlarr-4.0.21) (2021-11-30)
-
-#### Chore
-
-* update non-major docker tags ([#1429](https://github.com/truecharts/apps/issues/1429))
-* update non-major ([#1427](https://github.com/truecharts/apps/issues/1427))
-* update non-major deps helm releases
-
diff --git a/stable/prowlarr/4.0.29/CONFIG.md b/stable/prowlarr/4.0.30/CONFIG.md
similarity index 100%
rename from stable/prowlarr/4.0.29/CONFIG.md
rename to stable/prowlarr/4.0.30/CONFIG.md
diff --git a/stable/prowlarr/4.0.30/Chart.lock b/stable/prowlarr/4.0.30/Chart.lock
new file mode 100644
index 00000000000..dfd8a30e5af
--- /dev/null
+++ b/stable/prowlarr/4.0.30/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 8.9.13
+digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
+generated: "2021-12-07T09:22:42.607018581Z"
diff --git a/stable/prowlarr/4.0.29/Chart.yaml b/stable/prowlarr/4.0.30/Chart.yaml
similarity index 94%
rename from stable/prowlarr/4.0.29/Chart.yaml
rename to stable/prowlarr/4.0.30/Chart.yaml
index 3a69c7ecf30..7b6dd532033 100644
--- a/stable/prowlarr/4.0.29/Chart.yaml
+++ b/stable/prowlarr/4.0.30/Chart.yaml
@@ -1,5 +1,5 @@
apiVersion: v2
-appVersion: "0.1.6.1193"
+appVersion: "0.1.7.1199"
dependencies:
- name: common
repository: https://truecharts.org
@@ -21,7 +21,7 @@ name: prowlarr
sources:
- https://github.com/Prowlarr/Prowlarr
- https://github.com/k8s-at-home/container-images
-version: 4.0.29
+version: 4.0.30
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/prowlarr/4.0.29/README.md b/stable/prowlarr/4.0.30/README.md
similarity index 100%
rename from stable/prowlarr/4.0.29/README.md
rename to stable/prowlarr/4.0.30/README.md
diff --git a/stable/prowlarr/4.0.29/app-readme.md b/stable/prowlarr/4.0.30/app-readme.md
similarity index 100%
rename from stable/prowlarr/4.0.29/app-readme.md
rename to stable/prowlarr/4.0.30/app-readme.md
diff --git a/stable/prowlarr/4.0.29/charts/common-8.9.13.tgz b/stable/prowlarr/4.0.30/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/prowlarr/4.0.29/charts/common-8.9.13.tgz
rename to stable/prowlarr/4.0.30/charts/common-8.9.13.tgz
diff --git a/stable/prowlarr/4.0.29/helm-values.md b/stable/prowlarr/4.0.30/helm-values.md
similarity index 91%
rename from stable/prowlarr/4.0.29/helm-values.md
rename to stable/prowlarr/4.0.30/helm-values.md
index ab88cd2cbe9..ecada37e919 100644
--- a/stable/prowlarr/4.0.29/helm-values.md
+++ b/stable/prowlarr/4.0.30/helm-values.md
@@ -15,7 +15,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.TZ | string | `"UTC"` | Set the container timezone |
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
| image.repository | string | `"tccr.io/truecharts/prowlarr"` | image repository |
-| image.tag | string | `"v0.1.6.1193@sha256:ba1b0446117fb4e0884ddf118e7972632256ddfd24a92a73d109c24d080cbed6"` | image tag |
+| image.tag | string | `"v0.1.7.1199@sha256:e1fe5cd7fff64b0953190f88cc2c9d2f5352d0c68679ac8c4b054f3be3296c46"` | image tag |
| ingress.main | object | See values.yaml | Enable and configure ingress settings for the chart under this key. |
| persistence | object | See values.yaml | Configure persistence settings for the chart under this key. |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
diff --git a/stable/prowlarr/4.0.29/ix_values.yaml b/stable/prowlarr/4.0.30/ix_values.yaml
similarity index 89%
rename from stable/prowlarr/4.0.29/ix_values.yaml
rename to stable/prowlarr/4.0.30/ix_values.yaml
index e9d8c076707..41d02a4db03 100644
--- a/stable/prowlarr/4.0.29/ix_values.yaml
+++ b/stable/prowlarr/4.0.30/ix_values.yaml
@@ -2,7 +2,7 @@ image:
# -- image repository
repository: tccr.io/truecharts/prowlarr
# -- image tag
- tag: v0.1.6.1193@sha256:ba1b0446117fb4e0884ddf118e7972632256ddfd24a92a73d109c24d080cbed6
+ tag: v0.1.7.1199@sha256:e1fe5cd7fff64b0953190f88cc2c9d2f5352d0c68679ac8c4b054f3be3296c46
# -- image pull policy
pullPolicy: IfNotPresent
diff --git a/stable/prowlarr/4.0.29/questions.yaml b/stable/prowlarr/4.0.30/questions.yaml
similarity index 100%
rename from stable/prowlarr/4.0.29/questions.yaml
rename to stable/prowlarr/4.0.30/questions.yaml
diff --git a/stable/prowlarr/4.0.29/security.md b/stable/prowlarr/4.0.30/security.md
similarity index 99%
rename from stable/prowlarr/4.0.29/security.md
rename to stable/prowlarr/4.0.30/security.md
index b7fa89584ab..bcc09084554 100644
--- a/stable/prowlarr/4.0.29/security.md
+++ b/stable/prowlarr/4.0.30/security.md
@@ -35,7 +35,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/prowlarr:v0.1.6.1193@sha256:ba1b0446117fb4e0884ddf118e7972632256ddfd24a92a73d109c24d080cbed6
+ tccr.io/truecharts/prowlarr:v0.1.7.1199@sha256:e1fe5cd7fff64b0953190f88cc2c9d2f5352d0c68679ac8c4b054f3be3296c46
##### Scan Results
@@ -72,7 +72,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
|
-#### Container: tccr.io/truecharts/prowlarr:v0.1.6.1193@sha256:ba1b0446117fb4e0884ddf118e7972632256ddfd24a92a73d109c24d080cbed6 (ubuntu 20.04)
+#### Container: tccr.io/truecharts/prowlarr:v0.1.7.1199@sha256:e1fe5cd7fff64b0953190f88cc2c9d2f5352d0c68679ac8c4b054f3be3296c46 (ubuntu 20.04)
**ubuntu**
@@ -86,7 +86,7 @@ hide:
| bind9-libs | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | Expand...
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
|
| dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.debian.org/security/2021/dsa-4994
|
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| libc-bin | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
@@ -110,14 +110,14 @@ hide:
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | Expand...
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
@@ -131,12 +131,12 @@ hide:
| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | Expand...
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libpython3.8-stdlib | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | | Expand...
https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://ubuntu.com/security/notices/USN-5083-1
|
| libpython3.8-stdlib | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | | Expand...
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-1633.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
|
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| locales | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| locales | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
diff --git a/stable/prowlarr/4.0.29/templates/common.yaml b/stable/prowlarr/4.0.30/templates/common.yaml
similarity index 100%
rename from stable/prowlarr/4.0.29/templates/common.yaml
rename to stable/prowlarr/4.0.30/templates/common.yaml
diff --git a/stable/prowlarr/4.0.29/values.yaml b/stable/prowlarr/4.0.30/values.yaml
similarity index 100%
rename from stable/prowlarr/4.0.29/values.yaml
rename to stable/prowlarr/4.0.30/values.yaml
diff --git a/stable/tt-rss/4.0.14/CHANGELOG.md b/stable/tt-rss/4.0.15/CHANGELOG.md
similarity index 92%
rename from stable/tt-rss/4.0.14/CHANGELOG.md
rename to stable/tt-rss/4.0.15/CHANGELOG.md
index 949f0aed450..e97c0754607 100644
--- a/stable/tt-rss/4.0.14/CHANGELOG.md
+++ b/stable/tt-rss/4.0.15/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [tt-rss-4.0.15](https://github.com/truecharts/apps/compare/tt-rss-4.0.14...tt-rss-4.0.15) (2021-12-07)
+
+#### Chore
+
+* update non-major ([#1475](https://github.com/truecharts/apps/issues/1475))
+
+
+
### tt-rss-4.0.14 (2021-12-05)
@@ -88,12 +97,3 @@
### [tt-rss-4.0.5](https://github.com/truecharts/apps/compare/tt-rss-4.0.4...tt-rss-4.0.5) (2021-11-23)
#### Chore
-
-* update non-major deps helm releases ([#1386](https://github.com/truecharts/apps/issues/1386))
-
-
-
-
-### [tt-rss-4.0.4](https://github.com/truecharts/apps/compare/tt-rss-4.0.3...tt-rss-4.0.4) (2021-11-22)
-
-#### Chore
diff --git a/stable/tt-rss/4.0.14/CONFIG.md b/stable/tt-rss/4.0.15/CONFIG.md
similarity index 100%
rename from stable/tt-rss/4.0.14/CONFIG.md
rename to stable/tt-rss/4.0.15/CONFIG.md
diff --git a/stable/tt-rss/4.0.14/Chart.lock b/stable/tt-rss/4.0.15/Chart.lock
similarity index 84%
rename from stable/tt-rss/4.0.14/Chart.lock
rename to stable/tt-rss/4.0.15/Chart.lock
index 69ec2f5317a..0889c9dff28 100644
--- a/stable/tt-rss/4.0.14/Chart.lock
+++ b/stable/tt-rss/4.0.15/Chart.lock
@@ -6,4 +6,4 @@ dependencies:
repository: https://truecharts.org/
version: 6.0.22
digest: sha256:196a5a5d735b1866181c4d42cdb0c31dfde7dcec6339a60f648a80352e834a1d
-generated: "2021-12-05T23:07:38.021912259Z"
+generated: "2021-12-07T09:22:49.131833687Z"
diff --git a/stable/tt-rss/4.0.14/Chart.yaml b/stable/tt-rss/4.0.15/Chart.yaml
similarity index 95%
rename from stable/tt-rss/4.0.14/Chart.yaml
rename to stable/tt-rss/4.0.15/Chart.yaml
index 2a209d1eaee..48dd597b52f 100644
--- a/stable/tt-rss/4.0.14/Chart.yaml
+++ b/stable/tt-rss/4.0.15/Chart.yaml
@@ -1,8 +1,8 @@
apiVersion: v2
-appVersion: "1.9075.0"
+appVersion: "1.9076.0"
description: Tiny Tiny RSS is a free and open source web-based news feed (RSS/Atom) reader and aggregator
name: tt-rss
-version: 4.0.14
+version: 4.0.15
kubeVersion: ">=1.16.0-0"
keywords:
- tt-rss
diff --git a/stable/tt-rss/4.0.14/README.md b/stable/tt-rss/4.0.15/README.md
similarity index 100%
rename from stable/tt-rss/4.0.14/README.md
rename to stable/tt-rss/4.0.15/README.md
diff --git a/stable/tt-rss/4.0.14/app-readme.md b/stable/tt-rss/4.0.15/app-readme.md
similarity index 100%
rename from stable/tt-rss/4.0.14/app-readme.md
rename to stable/tt-rss/4.0.15/app-readme.md
diff --git a/stable/tt-rss/4.0.14/charts/common-8.9.13.tgz b/stable/tt-rss/4.0.15/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/tt-rss/4.0.14/charts/common-8.9.13.tgz
rename to stable/tt-rss/4.0.15/charts/common-8.9.13.tgz
diff --git a/stable/tt-rss/4.0.14/charts/postgresql-6.0.22.tgz b/stable/tt-rss/4.0.15/charts/postgresql-6.0.22.tgz
similarity index 100%
rename from stable/tt-rss/4.0.14/charts/postgresql-6.0.22.tgz
rename to stable/tt-rss/4.0.15/charts/postgresql-6.0.22.tgz
diff --git a/stable/tt-rss/4.0.14/helm-values.md b/stable/tt-rss/4.0.15/helm-values.md
similarity index 95%
rename from stable/tt-rss/4.0.14/helm-values.md
rename to stable/tt-rss/4.0.15/helm-values.md
index 799d878d501..58f6b04523d 100644
--- a/stable/tt-rss/4.0.14/helm-values.md
+++ b/stable/tt-rss/4.0.15/helm-values.md
@@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here
| envValueFrom.TTRSS_DB_PASS.secretKeyRef.name | string | `"dbcreds"` | |
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
| image.repository | string | `"tccr.io/truecharts/tt-rss"` | image repository |
-| image.tag | string | `"v1.9075.0@sha256:9779b47027627c16b3f6c0e69b9a5c7964a7b701ff8ccc6b1f0a7d5d371c7c6b"` | image tag |
+| image.tag | string | `"v1.9076.0@sha256:8f19d68e1da0e4686872eba18a0fd35e22f7206f0f6f5d12ddd31e537d813b9d"` | image tag |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/config"` | |
| podSecurityContext.runAsGroup | int | `0` | |
diff --git a/stable/tt-rss/4.0.14/ix_values.yaml b/stable/tt-rss/4.0.15/ix_values.yaml
similarity index 93%
rename from stable/tt-rss/4.0.14/ix_values.yaml
rename to stable/tt-rss/4.0.15/ix_values.yaml
index 01e8aaf06d3..938e099a9a1 100644
--- a/stable/tt-rss/4.0.14/ix_values.yaml
+++ b/stable/tt-rss/4.0.15/ix_values.yaml
@@ -4,7 +4,7 @@ image:
# -- image pull policy
pullPolicy: IfNotPresent
# -- image tag
- tag: v1.9075.0@sha256:9779b47027627c16b3f6c0e69b9a5c7964a7b701ff8ccc6b1f0a7d5d371c7c6b
+ tag: v1.9076.0@sha256:8f19d68e1da0e4686872eba18a0fd35e22f7206f0f6f5d12ddd31e537d813b9d
securityContext:
readOnlyRootFilesystem: false
diff --git a/stable/tt-rss/4.0.14/questions.yaml b/stable/tt-rss/4.0.15/questions.yaml
similarity index 100%
rename from stable/tt-rss/4.0.14/questions.yaml
rename to stable/tt-rss/4.0.15/questions.yaml
diff --git a/stable/tt-rss/4.0.14/security.md b/stable/tt-rss/4.0.15/security.md
similarity index 99%
rename from stable/tt-rss/4.0.14/security.md
rename to stable/tt-rss/4.0.15/security.md
index 1c14bcd3390..0d1cf848743 100644
--- a/stable/tt-rss/4.0.14/security.md
+++ b/stable/tt-rss/4.0.15/security.md
@@ -62,7 +62,7 @@ hide:
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
tccr.io/truecharts/postgresql:v14.1.0@sha256:4816fcc7f4f3a5a6db13aa70aa3d374fec33e096051be22db6a72d96cf2d8da1
- tccr.io/truecharts/tt-rss:v1.9075.0@sha256:9779b47027627c16b3f6c0e69b9a5c7964a7b701ff8ccc6b1f0a7d5d371c7c6b
+ tccr.io/truecharts/tt-rss:v1.9076.0@sha256:8f19d68e1da0e4686872eba18a0fd35e22f7206f0f6f5d12ddd31e537d813b9d
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
tccr.io/truecharts/postgresql:v14.1.0@sha256:4816fcc7f4f3a5a6db13aa70aa3d374fec33e096051be22db6a72d96cf2d8da1
@@ -317,7 +317,7 @@ hide:
-#### Container: tccr.io/truecharts/tt-rss:v1.9075.0@sha256:9779b47027627c16b3f6c0e69b9a5c7964a7b701ff8ccc6b1f0a7d5d371c7c6b (ubuntu 20.04)
+#### Container: tccr.io/truecharts/tt-rss:v1.9076.0@sha256:8f19d68e1da0e4686872eba18a0fd35e22f7206f0f6f5d12ddd31e537d813b9d (ubuntu 20.04)
**ubuntu**
@@ -334,7 +334,7 @@ hide:
| git | CVE-2018-1000021 | LOW | 1:2.25.1-1ubuntu3.2 | | Expand...
http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
| git-man | CVE-2018-1000021 | LOW | 1:2.25.1-1ubuntu3.2 | | Expand...
http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
| libapparmor1 | CVE-2016-1585 | MEDIUM | 2.13.3-7ubuntu5.1 | | Expand...
https://bugs.launchpad.net/apparmor/+bug/1597017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| libc-bin | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
| libc-bin | CVE-2016-10228 | LOW | 2.31-0ubuntu9.2 | | Expand...
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
|
@@ -359,17 +359,17 @@ hide:
| libgmp10 | CVE-2021-43618 | LOW | 2:6.2.0+dfsg-4 | | Expand...
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
|
| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
-| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libgssapi3-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhcrypto4-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimbase1-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libheimntlm0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
+| libhx509-5-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libicu66 | CVE-2021-30535 | MEDIUM | 66.1-2ubuntu2 | 66.1-2ubuntu2.1 | Expand...
https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
https://crbug.com/1194899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535
https://github.com/unicode-org/icu/pull/1698
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/
https://ubuntu.com/security/notices/USN-5156-1
|
| libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1build1 | | Expand...
http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libjpeg-turbo8 | CVE-2020-17541 | LOW | 2.0.3-0ubuntu1.20.04.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
|
| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libk5crypto3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libkrb5-26-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libkrb5-3 | CVE-2018-5709 | LOW | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libkrb5support0 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
@@ -388,13 +388,13 @@ hide:
| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | Expand...
https://bugs.python.org/issue36384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
https://docs.python.org/3/library/ipaddress.html
https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
https://github.com/python/cpython/pull/12577
https://github.com/python/cpython/pull/25099
https://github.com/sickcodes
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
https://security.netapp.com/advisory/ntap-20210622-0003/
https://sick.codes/sick-2021-014
https://ubuntu.com/security/notices/USN-4973-1
https://ubuntu.com/security/notices/USN-4973-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libpython3.8-stdlib | CVE-2021-3737 | MEDIUM | 3.8.10-0ubuntu1~20.04 | | Expand...
https://bugs.python.org/issue44022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://ubuntu.com/security/notices/USN-5083-1
|
| libpython3.8-stdlib | CVE-2021-23336 | LOW | 3.8.10-0ubuntu1~20.04 | | Expand...
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-1633.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libroken18-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
|
| libsqlite3-0 | CVE-2020-9849 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
|
| libsqlite3-0 | CVE-2020-9991 | LOW | 3.31.1-4ubuntu0.2 | | Expand...
http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
|
| libtasn1-6 | CVE-2018-1000654 | LOW | 4.16.0-2 | | Expand...
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| libtiff5 | CVE-2018-10126 | LOW | 4.1.0+git191117-2ubuntu0.20.04.2 | | Expand...
http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
-| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
|
+| libwind0-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | Expand...
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
|
| libxslt1.1 | CVE-2015-9019 | LOW | 1.1.34-4 | | Expand...
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
|
| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
|
| locales | CVE-2021-38604 | MEDIUM | 2.31-0ubuntu9.2 | | Expand...
https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/
https://security.netapp.com/advisory/ntap-20210909-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28213
https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
|
diff --git a/stable/tt-rss/4.0.14/templates/common.yaml b/stable/tt-rss/4.0.15/templates/common.yaml
similarity index 100%
rename from stable/tt-rss/4.0.14/templates/common.yaml
rename to stable/tt-rss/4.0.15/templates/common.yaml
diff --git a/stable/tt-rss/4.0.14/values.yaml b/stable/tt-rss/4.0.15/values.yaml
similarity index 100%
rename from stable/tt-rss/4.0.14/values.yaml
rename to stable/tt-rss/4.0.15/values.yaml