Commit new App releases for TrueCharts
Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
@@ -1,29 +0,0 @@
|
||||
# Default Helm-Values
|
||||
|
||||
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
|
||||
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
|
||||
|
||||
Most of our Apps also consume our "common" Helm Chart.
|
||||
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
|
||||
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| args | list | `["server","/data","--console-address",":9001"]` | Override the args for the default container. |
|
||||
| env | object | See below | environment variables. See more environment variables in the [minio documentation](https://docs.min.io). |
|
||||
| env.MINIO_ROOT_USER | string | `"minio"` | Minio Username |
|
||||
| env.TZ | string | `"UTC"` | Set the container timezone |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
|
||||
| image.repository | string | `"tccr.io/truecharts/minio"` | image repository |
|
||||
| image.tag | string | `"latest@sha256:8129f69c85b84e13f085a1ce127f108cee0ea84a1f496e8065796c7a15a08442"` | image tag |
|
||||
| persistence.config.enabled | bool | `true` | |
|
||||
| persistence.config.mountPath | string | `"/data"` | |
|
||||
| probes.liveness.path | string | `"/minio/health/live"` | |
|
||||
| probes.readiness.path | string | `"/minio/health/ready"` | |
|
||||
| secret.MINIO_ROOT_PASSWORD | string | `"changeme"` | Minio Password |
|
||||
| securityContext.readOnlyRootFilesystem | bool | `false` | |
|
||||
| service | object | See values.yaml | Configures service settings for the chart. |
|
||||
|
||||
All Rights Reserved - The TrueCharts Project
|
||||
@@ -1,54 +0,0 @@
|
||||
image:
|
||||
# -- image repository
|
||||
repository: tccr.io/truecharts/minio
|
||||
# -- image tag
|
||||
tag: latest@sha256:8129f69c85b84e13f085a1ce127f108cee0ea84a1f496e8065796c7a15a08442
|
||||
# -- image pull policy
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
# -- Override the args for the default container.
|
||||
args: ["server", "/data", "--console-address", ":9001"]
|
||||
|
||||
secret:
|
||||
# -- Minio Password
|
||||
MINIO_ROOT_PASSWORD: "changeme"
|
||||
|
||||
# -- environment variables. See more environment variables in the [minio documentation](https://docs.min.io).
|
||||
# @default -- See below
|
||||
env:
|
||||
# -- Set the container timezone
|
||||
TZ: UTC
|
||||
# -- Minio Username
|
||||
MINIO_ROOT_USER: "minio"
|
||||
MINIO_BROWSER_REDIRECT_URL: ""
|
||||
|
||||
probes:
|
||||
liveness:
|
||||
path: "/minio/health/live"
|
||||
|
||||
readiness:
|
||||
path: "/minio/health/ready"
|
||||
|
||||
# -- Configures service settings for the chart.
|
||||
# @default -- See values.yaml
|
||||
service:
|
||||
main:
|
||||
ports:
|
||||
main:
|
||||
port: 10106
|
||||
targetPort: 9000
|
||||
console:
|
||||
enabled: true
|
||||
ports:
|
||||
console:
|
||||
enabled: true
|
||||
targetPort: 9001
|
||||
port: 10107
|
||||
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: false
|
||||
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
mountPath: "/data"
|
||||
@@ -1,6 +1,15 @@
|
||||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="minio-1.1.0"></a>
|
||||
### [minio-1.1.0](https://github.com/truecharts/apps/compare/minio-console-1.0.50...minio-1.1.0) (2022-02-20)
|
||||
|
||||
#### Fix
|
||||
|
||||
* Fix services and add ingress option for both services ([#1911](https://github.com/truecharts/apps/issues/1911))
|
||||
|
||||
|
||||
|
||||
<a name="minio-1.0.28"></a>
|
||||
### [minio-1.0.28](https://github.com/truecharts/apps/compare/minio-console-1.0.49...minio-1.0.28) (2022-02-15)
|
||||
|
||||
@@ -88,12 +97,3 @@
|
||||
|
||||
<a name="minio-1.0.19"></a>
|
||||
### [minio-1.0.19](https://github.com/truecharts/apps/compare/minio-1.0.18...minio-1.0.19) (2022-01-13)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1712](https://github.com/truecharts/apps/issues/1712))
|
||||
|
||||
#### Feat
|
||||
|
||||
* expose capabilities in GUI ([#1709](https://github.com/truecharts/apps/issues/1709))
|
||||
|
||||
@@ -3,4 +3,4 @@ dependencies:
|
||||
repository: https://truecharts.org
|
||||
version: 8.15.4
|
||||
digest: sha256:d6aca168828f3fef09de9fbc634c303d040d74299b508a7cedf473f66f5a4503
|
||||
generated: "2022-02-15T14:15:24.984126229Z"
|
||||
generated: "2022-02-20T20:04:43.004005313Z"
|
||||
@@ -19,7 +19,7 @@ maintainers:
|
||||
name: minio
|
||||
sources:
|
||||
- https://github.com/minio/minio
|
||||
version: 1.0.28
|
||||
version: 1.1.0
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- media
|
||||
45
stable/minio/1.1.0/helm-values.md
Normal file
45
stable/minio/1.1.0/helm-values.md
Normal file
@@ -0,0 +1,45 @@
|
||||
# Default Helm-Values
|
||||
|
||||
TrueCharts is primarily build to supply TrueNAS SCALE Apps.
|
||||
However, we also supply all Apps as standard Helm-Charts. In this document we aim to document the default values in our values.yaml file.
|
||||
|
||||
Most of our Apps also consume our "common" Helm Chart.
|
||||
If this is the case, this means that all values.yaml values are set to the common chart values.yaml by default. This values.yaml file will only contain values that deviate from the common chart.
|
||||
You will, however, be able to use all values referenced in the common chart here, besides the values listed in this document.
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| args[0] | string | `"server"` | |
|
||||
| args[1] | string | `"/data"` | |
|
||||
| args[2] | string | `"--address"` | |
|
||||
| args[3] | string | `":10106"` | |
|
||||
| args[4] | string | `"--console-address"` | |
|
||||
| args[5] | string | `":10107"` | |
|
||||
| env.MINIO_BROWSER_REDIRECT_URL | string | `""` | |
|
||||
| env.MINIO_ROOT_USER | string | `"minio"` | |
|
||||
| env.MINIO_SERVER_URL | string | `""` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/minio"` | |
|
||||
| image.tag | string | `"latest@sha256:8129f69c85b84e13f085a1ce127f108cee0ea84a1f496e8065796c7a15a08442"` | |
|
||||
| persistence.config.enabled | bool | `true` | |
|
||||
| persistence.config.mountPath | string | `"/data"` | |
|
||||
| probes.liveness.custom | bool | `true` | |
|
||||
| probes.liveness.spec.httpGet.path | string | `"/minio/health/live"` | |
|
||||
| probes.liveness.spec.httpGet.port | int | `10106` | |
|
||||
| probes.liveness.spec.httpGet.scheme | string | `"HTTP"` | |
|
||||
| probes.readiness.custom | bool | `true` | |
|
||||
| probes.readiness.spec.httpGet.path | string | `"/minio/health/ready"` | |
|
||||
| probes.readiness.spec.httpGet.port | int | `10106` | |
|
||||
| probes.readiness.spec.httpGet.scheme | string | `"HTTP"` | |
|
||||
| secret.MINIO_ROOT_PASSWORD | string | `"changeme"` | |
|
||||
| securityContext.readOnlyRootFilesystem | bool | `false` | |
|
||||
| service.api.enabled | bool | `true` | |
|
||||
| service.api.ports.api.enabled | bool | `true` | |
|
||||
| service.api.ports.api.port | int | `10106` | |
|
||||
| service.api.ports.api.targetPort | int | `10106` | |
|
||||
| service.main.ports.main.port | int | `10107` | |
|
||||
| service.main.ports.main.targetPort | int | `10107` | |
|
||||
|
||||
All Rights Reserved - The TrueCharts Project
|
||||
52
stable/minio/1.1.0/ix_values.yaml
Normal file
52
stable/minio/1.1.0/ix_values.yaml
Normal file
@@ -0,0 +1,52 @@
|
||||
image:
|
||||
repository: tccr.io/truecharts/minio
|
||||
tag: latest@sha256:8129f69c85b84e13f085a1ce127f108cee0ea84a1f496e8065796c7a15a08442
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
args: ["server", "/data", "--address", ":10106", "--console-address", ":10107"]
|
||||
|
||||
secret:
|
||||
MINIO_ROOT_PASSWORD: "changeme"
|
||||
|
||||
env:
|
||||
MINIO_ROOT_USER: "minio"
|
||||
MINIO_BROWSER_REDIRECT_URL: ""
|
||||
MINIO_SERVER_URL: ""
|
||||
|
||||
probes:
|
||||
liveness:
|
||||
custom: true
|
||||
spec:
|
||||
httpGet:
|
||||
scheme: HTTP
|
||||
path: "/minio/health/live"
|
||||
port: 10106
|
||||
readiness:
|
||||
custom: true
|
||||
spec:
|
||||
httpGet:
|
||||
scheme: HTTP
|
||||
path: "/minio/health/ready"
|
||||
port: 10106
|
||||
|
||||
service:
|
||||
main:
|
||||
ports:
|
||||
main:
|
||||
port: 10107
|
||||
targetPort: 10107
|
||||
api:
|
||||
enabled: true
|
||||
ports:
|
||||
api:
|
||||
enabled: true
|
||||
targetPort: 10106
|
||||
port: 10106
|
||||
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: false
|
||||
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
mountPath: "/data"
|
||||
@@ -210,6 +210,13 @@ questions:
|
||||
required: true
|
||||
- variable: MINIO_BROWSER_REDIRECT_URL
|
||||
label: "MINIO_BROWSER_REDIRECT_URL"
|
||||
description: "Specify the URL the MinIO Console provides as the redirect URL eg. https://minioconsole.mydomain.com"
|
||||
schema:
|
||||
type: string
|
||||
default: ""
|
||||
- variable: MINIO_SERVER_URL
|
||||
label: "MINIO_SERVER_URL"
|
||||
description: "Specify the URL hostname the MinIO Console should use for connecting to the MinIO Server. eg. https://minioserver.mydomain.com"
|
||||
schema:
|
||||
type: string
|
||||
default: ""
|
||||
@@ -411,7 +418,7 @@ questions:
|
||||
description: "This port exposes the container port on the service"
|
||||
schema:
|
||||
type: int
|
||||
default: 10106
|
||||
default: 10107
|
||||
required: true
|
||||
- variable: advanced
|
||||
label: "Show Advanced settings"
|
||||
@@ -446,10 +453,10 @@ questions:
|
||||
description: "The internal(!) port on the container the Application runs on"
|
||||
schema:
|
||||
type: int
|
||||
default: 9000
|
||||
default: 10107
|
||||
|
||||
- variable: console
|
||||
label: "Console Service"
|
||||
- variable: api
|
||||
label: "API Service"
|
||||
description: "The Primary service on which the healthcheck runs, often the webUI"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
@@ -527,8 +534,8 @@ questions:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: console
|
||||
label: "Console Service Port Configuration"
|
||||
- variable: api
|
||||
label: "API Service Port Configuration"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
@@ -538,7 +545,7 @@ questions:
|
||||
description: "This port exposes the container port on the service"
|
||||
schema:
|
||||
type: int
|
||||
default: 10107
|
||||
default: 10106
|
||||
required: true
|
||||
- variable: advanced
|
||||
label: "Show Advanced settings"
|
||||
@@ -573,7 +580,7 @@ questions:
|
||||
description: "The internal(!) port on the container the Application runs on"
|
||||
schema:
|
||||
type: int
|
||||
default: 9001
|
||||
default: 10106
|
||||
|
||||
- variable: serviceexpert
|
||||
group: "Networking and Services"
|
||||
@@ -1380,6 +1387,173 @@ questions:
|
||||
schema:
|
||||
type: string
|
||||
|
||||
- variable: api
|
||||
label: "Console Ingress"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: enabled
|
||||
label: "Enable Ingress"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
show_subquestions_if: true
|
||||
subquestions:
|
||||
- variable: hosts
|
||||
label: "Hosts"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: hostEntry
|
||||
label: "Host"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: host
|
||||
label: "HostName"
|
||||
schema:
|
||||
type: string
|
||||
default: ""
|
||||
required: true
|
||||
- variable: paths
|
||||
label: "Paths"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: pathEntry
|
||||
label: "Host"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: path
|
||||
label: "path"
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
default: "/"
|
||||
- variable: pathType
|
||||
label: "pathType"
|
||||
schema:
|
||||
type: string
|
||||
required: true
|
||||
default: "Prefix"
|
||||
|
||||
- variable: tls
|
||||
label: "TLS-Settings"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: tlsEntry
|
||||
label: "Host"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: hosts
|
||||
label: "Certificate Hosts"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: host
|
||||
label: "Host"
|
||||
schema:
|
||||
type: string
|
||||
default: ""
|
||||
required: true
|
||||
- variable: scaleCert
|
||||
label: "Select TrueNAS SCALE Certificate"
|
||||
schema:
|
||||
type: int
|
||||
$ref:
|
||||
- "definitions/certificate"
|
||||
|
||||
- variable: entrypoint
|
||||
label: "(Advanced) Traefik Entrypoint"
|
||||
description: "Entrypoint used by Traefik when using Traefik as Ingress Provider"
|
||||
schema:
|
||||
type: string
|
||||
default: "websecure"
|
||||
required: true
|
||||
- variable: middlewares
|
||||
label: "Traefik Middlewares"
|
||||
description: "Add previously created Traefik Middlewares to this Ingress"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: name
|
||||
label: "Name"
|
||||
schema:
|
||||
type: string
|
||||
default: ""
|
||||
required: true
|
||||
|
||||
- variable: expert
|
||||
label: "Show Expert Configuration Options"
|
||||
schema:
|
||||
type: boolean
|
||||
default: false
|
||||
show_subquestions_if: true
|
||||
subquestions:
|
||||
- variable: enableFixedMiddlewares
|
||||
description: "These middlewares enforce a number of best practices."
|
||||
label: "Enable Default Middlewares"
|
||||
schema:
|
||||
type: boolean
|
||||
default: true
|
||||
- variable: ingressClassName
|
||||
label: "IngressClass Name"
|
||||
schema:
|
||||
type: string
|
||||
default: ""
|
||||
- variable: labelsList
|
||||
label: "Labels"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: labelItem
|
||||
label: "Label"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: name
|
||||
label: "Name"
|
||||
schema:
|
||||
type: string
|
||||
- variable: value
|
||||
label: "Value"
|
||||
schema:
|
||||
type: string
|
||||
- variable: annotationsList
|
||||
label: "Annotations"
|
||||
schema:
|
||||
type: list
|
||||
default: []
|
||||
items:
|
||||
- variable: annotationItem
|
||||
label: "Label"
|
||||
schema:
|
||||
additional_attrs: true
|
||||
type: dict
|
||||
attrs:
|
||||
- variable: name
|
||||
label: "Name"
|
||||
schema:
|
||||
type: string
|
||||
- variable: value
|
||||
label: "Value"
|
||||
schema:
|
||||
type: string
|
||||
|
||||
- variable: ingressList
|
||||
label: "Add Manual Custom Ingresses"
|
||||
group: "Ingress"
|
||||
@@ -156,11 +156,12 @@ hide:
|
||||
| gnutls | CVE-2021-20231 | MEDIUM | 3.6.14-8.el8_3 | 3.6.16-4.el8 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922276">https://bugzilla.redhat.com/show_bug.cgi?id=1922276</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20231.html">https://linux.oracle.com/cve/CVE-2021-20231.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4451.html">https://linux.oracle.com/errata/ELSA-2021-4451.html</a><br><a href="https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/</a><br><a href="https://security.netapp.com/advisory/ntap-20210416-0005/">https://security.netapp.com/advisory/ntap-20210416-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5029-1">https://ubuntu.com/security/notices/USN-5029-1</a><br><a href="https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10">https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10</a><br></details> |
|
||||
| gnutls | CVE-2021-20232 | MEDIUM | 3.6.14-8.el8_3 | 3.6.16-4.el8 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922275">https://bugzilla.redhat.com/show_bug.cgi?id=1922275</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232</a><br><a href="https://linux.oracle.com/cve/CVE-2021-20232.html">https://linux.oracle.com/cve/CVE-2021-20232.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4451.html">https://linux.oracle.com/errata/ELSA-2021-4451.html</a><br><a href="https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E">https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/</a><br><a href="https://security.netapp.com/advisory/ntap-20210416-0005/">https://security.netapp.com/advisory/ntap-20210416-0005/</a><br><a href="https://ubuntu.com/security/notices/USN-5029-1">https://ubuntu.com/security/notices/USN-5029-1</a><br><a href="https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10">https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10</a><br></details> |
|
||||
| gnutls | CVE-2021-3580 | MEDIUM | 3.6.14-8.el8_3 | 3.6.16-4.el8 | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1967983">https://bugzilla.redhat.com/show_bug.cgi?id=1967983</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3580.html">https://linux.oracle.com/cve/CVE-2021-3580.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4451.html">https://linux.oracle.com/errata/ELSA-2021-4451.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html">https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html</a><br><a href="https://security.netapp.com/advisory/ntap-20211104-0006/">https://security.netapp.com/advisory/ntap-20211104-0006/</a><br><a href="https://ubuntu.com/security/notices/USN-4990-1">https://ubuntu.com/security/notices/USN-4990-1</a><br></details> |
|
||||
| gnutls | CVE-2021-4209 | LOW | 3.6.14-8.el8_3 | | <details><summary>Expand...</summary></details> |
|
||||
| json-c | CVE-2020-12762 | MEDIUM | 0.13.1-0.4.el8 | 0.13.1-2.el8 | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762</a><br><a href="https://github.com/json-c/json-c/pull/592">https://github.com/json-c/json-c/pull/592</a><br><a href="https://github.com/rsyslog/libfastjson/issues/161">https://github.com/rsyslog/libfastjson/issues/161</a><br><a href="https://linux.oracle.com/cve/CVE-2020-12762.html">https://linux.oracle.com/cve/CVE-2020-12762.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4382.html">https://linux.oracle.com/errata/ELSA-2021-4382.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html">https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html">https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/</a><br><a href="https://security.gentoo.org/glsa/202006-13">https://security.gentoo.org/glsa/202006-13</a><br><a href="https://security.netapp.com/advisory/ntap-20210521-0001/">https://security.netapp.com/advisory/ntap-20210521-0001/</a><br><a href="https://ubuntu.com/security/notices/USN-4360-1">https://ubuntu.com/security/notices/USN-4360-1</a><br><a href="https://ubuntu.com/security/notices/USN-4360-4">https://ubuntu.com/security/notices/USN-4360-4</a><br><a href="https://usn.ubuntu.com/4360-1/">https://usn.ubuntu.com/4360-1/</a><br><a href="https://usn.ubuntu.com/4360-4/">https://usn.ubuntu.com/4360-4/</a><br><a href="https://www.debian.org/security/2020/dsa-4741">https://www.debian.org/security/2020/dsa-4741</a><br></details> |
|
||||
| krb5-libs | CVE-2020-17049 | MEDIUM | 1.18.2-8.3.el8_4 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/11/10/3">http://www.openwall.com/lists/oss-security/2021/11/10/3</a><br><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049</a><br><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049</a><br></details> |
|
||||
| libarchive | CVE-2020-21674 | MEDIUM | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="https://github.com/libarchive/libarchive/commit/4f085eea879e2be745f4d9bf57e8513ae48157f4">https://github.com/libarchive/libarchive/commit/4f085eea879e2be745f4d9bf57e8513ae48157f4</a><br><a href="https://github.com/libarchive/libarchive/issues/1298">https://github.com/libarchive/libarchive/issues/1298</a><br></details> |
|
||||
| libarchive | CVE-2021-23177 | MEDIUM | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177</a><br></details> |
|
||||
| libarchive | CVE-2021-31566 | MEDIUM | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566</a><br></details> |
|
||||
| libarchive | CVE-2021-23177 | MEDIUM | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177</a><br><a href="https://ubuntu.com/security/notices/USN-5291-1">https://ubuntu.com/security/notices/USN-5291-1</a><br></details> |
|
||||
| libarchive | CVE-2021-31566 | MEDIUM | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566</a><br><a href="https://ubuntu.com/security/notices/USN-5291-1">https://ubuntu.com/security/notices/USN-5291-1</a><br></details> |
|
||||
| libarchive | CVE-2017-14166 | LOW | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2017/09/06/5">http://www.openwall.com/lists/oss-security/2017/09/06/5</a><br><a href="https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/">https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14166">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14166</a><br><a href="https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71">https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71</a><br><a href="https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html">https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html</a><br><a href="https://security.gentoo.org/glsa/201908-11">https://security.gentoo.org/glsa/201908-11</a><br><a href="https://ubuntu.com/security/notices/USN-3736-1">https://ubuntu.com/security/notices/USN-3736-1</a><br><a href="https://usn.ubuntu.com/3736-1/">https://usn.ubuntu.com/3736-1/</a><br><a href="https://www.debian.org/security/2018/dsa-4360">https://www.debian.org/security/2018/dsa-4360</a><br></details> |
|
||||
| libarchive | CVE-2017-14501 | LOW | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="https://bugs.debian.org/875966">https://bugs.debian.org/875966</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14501">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14501</a><br><a href="https://github.com/libarchive/libarchive/issues/949">https://github.com/libarchive/libarchive/issues/949</a><br><a href="https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html">https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html</a><br><a href="https://security.gentoo.org/glsa/201908-11">https://security.gentoo.org/glsa/201908-11</a><br><a href="https://ubuntu.com/security/notices/USN-3736-1">https://ubuntu.com/security/notices/USN-3736-1</a><br><a href="https://usn.ubuntu.com/3736-1/">https://usn.ubuntu.com/3736-1/</a><br><a href="https://www.debian.org/security/2018/dsa-4360">https://www.debian.org/security/2018/dsa-4360</a><br></details> |
|
||||
| libarchive | CVE-2018-1000879 | LOW | 3.3.3-1.el8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html</a><br><a href="http://www.securityfocus.com/bid/106324">http://www.securityfocus.com/bid/106324</a><br><a href="https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909">https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909</a><br><a href="https://github.com/libarchive/libarchive/pull/1105">https://github.com/libarchive/libarchive/pull/1105</a><br><a href="https://github.com/libarchive/libarchive/pull/1105/commits/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175">https://github.com/libarchive/libarchive/pull/1105/commits/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/</a><br></details> |
|
||||
@@ -198,7 +199,7 @@ hide:
|
||||
| libtasn1 | CVE-2018-1000654 | LOW | 4.13-3.el8 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a><br><a href="http://www.securityfocus.com/bid/105151">http://www.securityfocus.com/bid/105151</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654</a><br><a href="https://gitlab.com/gnutls/libtasn1/issues/4">https://gitlab.com/gnutls/libtasn1/issues/4</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br></details> |
|
||||
| libuuid | CVE-2022-0563 | MEDIUM | 2.32.1-27.el8 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| libzstd | CVE-2021-24032 | LOW | 1.4.4-1.el8 | | <details><summary>Expand...</summary><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24032</a><br><a href="https://github.com/facebook/zstd/issues/2491">https://github.com/facebook/zstd/issues/2491</a><br><a href="https://ubuntu.com/security/notices/USN-4760-1">https://ubuntu.com/security/notices/USN-4760-1</a><br><a href="https://www.facebook.com/security/advisories/cve-2021-24032">https://www.facebook.com/security/advisories/cve-2021-24032</a><br></details> |
|
||||
| lua-libs | CVE-2021-43519 | MEDIUM | 5.3.4-11.el8 | | <details><summary>Expand...</summary><a href="http://lua-users.org/lists/lua-l/2021-10/msg00123.html">http://lua-users.org/lists/lua-l/2021-10/msg00123.html</a><br><a href="http://lua-users.org/lists/lua-l/2021-11/msg00015.html">http://lua-users.org/lists/lua-l/2021-11/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/</a><br></details> |
|
||||
| lua-libs | CVE-2021-43519 | MEDIUM | 5.3.4-11.el8 | | <details><summary>Expand...</summary><a href="http://lua-users.org/lists/lua-l/2021-10/msg00123.html">http://lua-users.org/lists/lua-l/2021-10/msg00123.html</a><br><a href="http://lua-users.org/lists/lua-l/2021-11/msg00015.html">http://lua-users.org/lists/lua-l/2021-11/msg00015.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/</a><br></details> |
|
||||
| lua-libs | CVE-2020-24370 | LOW | 5.3.4-11.el8 | 5.3.4-12.el8 | <details><summary>Expand...</summary><a href="http://lua-users.org/lists/lua-l/2020-07/msg00324.html">http://lua-users.org/lists/lua-l/2020-07/msg00324.html</a><br><a href="https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b">https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b</a><br><a href="https://linux.oracle.com/cve/CVE-2020-24370.html">https://linux.oracle.com/cve/CVE-2020-24370.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4510.html">https://linux.oracle.com/errata/ELSA-2021-4510.html</a><br><a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/</a><br></details> |
|
||||
| lz4-libs | CVE-2019-17543 | MEDIUM | 1.8.3-3.el8_4 | | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html</a><br><a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941</a><br><a href="https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2">https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2</a><br><a href="https://github.com/lz4/lz4/issues/801">https://github.com/lz4/lz4/issues/801</a><br><a href="https://github.com/lz4/lz4/pull/756">https://github.com/lz4/lz4/pull/756</a><br><a href="https://github.com/lz4/lz4/pull/760">https://github.com/lz4/lz4/pull/760</a><br><a href="https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E">https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E</a><br><a href="https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E</a><br><a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a><br></details> |
|
||||
| ncurses-base | CVE-2019-17594 | MEDIUM | 6.1-7.20180224.el8 | 6.1-9.20180224.el8 | <details><summary>Expand...</summary><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594</a><br><a href="https://linux.oracle.com/cve/CVE-2019-17594.html">https://linux.oracle.com/cve/CVE-2019-17594.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-4426.html">https://linux.oracle.com/errata/ELSA-2021-4426.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html</a><br><a href="https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html">https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html</a><br><a href="https://security.gentoo.org/glsa/202101-28">https://security.gentoo.org/glsa/202101-28</a><br></details> |
|
||||
Reference in New Issue
Block a user