From 02a6c118666a9663b93a55ae8132cc827bb63016 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Sat, 4 Dec 2021 22:25:30 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- stable/jackett/9.0.32/sec-scan.md | 600 ------------------ .../jackett/{9.0.32 => 9.0.33}/CHANGELOG.md | 18 +- stable/jackett/{9.0.32 => 9.0.33}/CONFIG.md | 0 stable/jackett/{9.0.32 => 9.0.33}/Chart.lock | 2 +- stable/jackett/{9.0.32 => 9.0.33}/Chart.yaml | 2 +- stable/jackett/{9.0.32 => 9.0.33}/README.md | 0 .../jackett/{9.0.32 => 9.0.33}/app-readme.md | 0 .../charts/common-8.9.10.tgz | Bin .../jackett/{9.0.32 => 9.0.33}/helm-values.md | 0 .../jackett/{9.0.32 => 9.0.33}/ix_values.yaml | 0 .../jackett/{9.0.32 => 9.0.33}/questions.yaml | 0 stable/jackett/{9.0.32 => 9.0.33}/security.md | 5 + .../{9.0.32 => 9.0.33}/templates/common.yaml | 0 stable/jackett/{9.0.32 => 9.0.33}/values.yaml | 0 14 files changed, 16 insertions(+), 611 deletions(-) delete mode 100644 stable/jackett/9.0.32/sec-scan.md rename stable/jackett/{9.0.32 => 9.0.33}/CHANGELOG.md (91%) rename stable/jackett/{9.0.32 => 9.0.33}/CONFIG.md (100%) rename stable/jackett/{9.0.32 => 9.0.33}/Chart.lock (78%) rename stable/jackett/{9.0.32 => 9.0.33}/Chart.yaml (97%) rename stable/jackett/{9.0.32 => 9.0.33}/README.md (100%) rename stable/jackett/{9.0.32 => 9.0.33}/app-readme.md (100%) rename stable/jackett/{9.0.32 => 9.0.33}/charts/common-8.9.10.tgz (100%) rename stable/jackett/{9.0.32 => 9.0.33}/helm-values.md (100%) rename stable/jackett/{9.0.32 => 9.0.33}/ix_values.yaml (100%) rename stable/jackett/{9.0.32 => 9.0.33}/questions.yaml (100%) rename stable/jackett/{9.0.32 => 9.0.33}/security.md (99%) rename stable/jackett/{9.0.32 => 9.0.33}/templates/common.yaml (100%) rename stable/jackett/{9.0.32 => 9.0.33}/values.yaml (100%) diff --git a/stable/jackett/9.0.32/sec-scan.md b/stable/jackett/9.0.32/sec-scan.md deleted file mode 100644 index 79b22e1f84b..00000000000 --- a/stable/jackett/9.0.32/sec-scan.md +++ /dev/null @@ -1,600 +0,0 @@ -# Security Scan - -## Helm-Chart - -##### Scan Results - -``` -2021-12-03T18:33:16.449Z INFO Need to update the built-in policies -2021-12-03T18:33:16.449Z INFO Downloading the built-in policies... -2021-12-03T18:33:17.259Z INFO Detected config files: 1 - -jackett/templates/common.yaml (kubernetes) -========================================== -Tests: 40 (SUCCESSES: 28, FAILURES: 12, EXCEPTIONS: 0) -Failures: 12 (UNKNOWN: 0, LOW: 5, MEDIUM: 7, HIGH: 0, CRITICAL: 0) - -+---------------------------+------------+-----------------------------------+----------+------------------------------------------+ -| TYPE | MISCONF ID | CHECK | SEVERITY | MESSAGE | -+---------------------------+------------+-----------------------------------+----------+------------------------------------------+ -| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Container 'RELEASE-NAME-jackett' of | -| | | | | Deployment 'RELEASE-NAME-jackett' | -| | | | | should add 'ALL' to | -| | | | | 'securityContext.capabilities.drop' | -| | | | | -->avd.aquasec.com/appshield/ksv003 | -+ +------------+-----------------------------------+----------+------------------------------------------+ -| | KSV012 | Runs as root user | MEDIUM | Container 'autopermissions' of | -| | | | | Deployment 'RELEASE-NAME-jackett' should | -| | | | | set 'securityContext.runAsNonRoot' to | -| | | | | true -->avd.aquasec.com/appshield/ksv012 | -+ +------------+-----------------------------------+----------+------------------------------------------+ -| | KSV013 | Image tag ':latest' used | LOW | Container 'RELEASE-NAME-jackett' of | -| | | | | Deployment 'RELEASE-NAME-jackett' | -| | | | | should specify an image tag | -| | | | | -->avd.aquasec.com/appshield/ksv013 | -+ + + + +------------------------------------------+ -| | | | | Container 'autopermissions' of | -| | | | | Deployment 'RELEASE-NAME-jackett' | -| | | | | should specify an image tag | -| | | | | -->avd.aquasec.com/appshield/ksv013 | -+ +------------+-----------------------------------+ +------------------------------------------+ -| | KSV014 | Root file system is not read-only | | Container 'RELEASE-NAME-jackett' | -| | | | | of Deployment | -| | | | | 'RELEASE-NAME-jackett' should set | -| | | | | 'securityContext.readOnlyRootFilesystem' | -| | | | | to true | -| | | | | -->avd.aquasec.com/appshield/ksv014 | -+ + + + +------------------------------------------+ -| | | | | Container 'autopermissions' | -| | | | | of Deployment | -| | | | | 'RELEASE-NAME-jackett' should set | -| | | | | 'securityContext.readOnlyRootFilesystem' | -| | | | | to true | -| | | | | -->avd.aquasec.com/appshield/ksv014 | -+ +------------+-----------------------------------+----------+------------------------------------------+ -| | KSV019 | Seccomp policies disabled | MEDIUM | Container 'RELEASE-NAME-jackett' of | -| | | | | Deployment 'RELEASE-NAME-jackett' | -| | | | | should specify a seccomp profile | -| | | | | -->avd.aquasec.com/appshield/ksv019 | -+ + + + +------------------------------------------+ -| | | | | Container 'autopermissions' of | -| | | | | Deployment 'RELEASE-NAME-jackett' | -| | | | | should specify a seccomp profile | -| | | | | -->avd.aquasec.com/appshield/ksv019 | -+ +------------+-----------------------------------+ +------------------------------------------+ -| | KSV020 | Runs with low user ID | | Container 'RELEASE-NAME-jackett' of | -| | | | | Deployment 'RELEASE-NAME-jackett' should | -| | | | | set 'securityContext.runAsUser' > 10000 | -| | | | | -->avd.aquasec.com/appshield/ksv020 | -+ + + + +------------------------------------------+ -| | | | | Container 'autopermissions' of | -| | | | | Deployment 'RELEASE-NAME-jackett' should | -| | | | | set 'securityContext.runAsUser' > 10000 | -| | | | | -->avd.aquasec.com/appshield/ksv020 | -+ +------------+-----------------------------------+ +------------------------------------------+ -| | KSV021 | Runs with low group ID | | Container 'RELEASE-NAME-jackett' of | -| | | | | Deployment 'RELEASE-NAME-jackett' should | -| | | | | set 'securityContext.runAsGroup' > 10000 | -| | | | | -->avd.aquasec.com/appshield/ksv021 | -+ + + + +------------------------------------------+ -| | | | | Container 'autopermissions' of | -| | | | | Deployment 'RELEASE-NAME-jackett' should | -| | | | | set 'securityContext.runAsGroup' > 10000 | -| | | | | -->avd.aquasec.com/appshield/ksv021 | -+---------------------------+------------+-----------------------------------+----------+------------------------------------------+ -``` - -## Containers - -##### Detected Containers - - ghcr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/jackett:v0.20.83@sha256:b24ade69bfc1b9725c42043c0b4aab341aed7c2cb462fdc21bb5287aaa574d79 - -##### Scan Results - -**Container: ghcr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c** - -``` -2021-12-03T18:33:17.339Z INFO Need to update DB -2021-12-03T18:33:17.340Z INFO Downloading DB... -2021-12-03T18:33:19.939Z INFO Detected OS: alpine -2021-12-03T18:33:19.939Z INFO Detecting Alpine vulnerabilities... -2021-12-03T18:33:19.941Z INFO Number of language-specific files: 0 - -ghcr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2) -========================================================================================================================= -Total: 22 (UNKNOWN: 0, LOW: 0, MEDIUM: 4, HIGH: 18, CRITICAL: 0) - -+------------+------------------+----------+-------------------+---------------+---------------------------------------+ -| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | -+------------+------------------+----------+-------------------+---------------+---------------------------------------+ -| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42378 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42379 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42379 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42380 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42380 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42381 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42381 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42382 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42382 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42383 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42383 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42384 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42384 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42385 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42385 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42386 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42386 | -+ +------------------+----------+ +---------------+---------------------------------------+ -| | CVE-2021-42374 | MEDIUM | | 1.33.1-r4 | busybox: out-of-bounds read | -| | | | | | in unlzma applet leads to | -| | | | | | information leak and denial... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42374 | -+ +------------------+ + +---------------+---------------------------------------+ -| | CVE-2021-42375 | | | 1.33.1-r5 | busybox: incorrect handling | -| | | | | | of a special element in | -| | | | | | ash applet leads to... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42375 | -+------------+------------------+----------+ +---------------+---------------------------------------+ -| ssl_client | CVE-2021-42378 | HIGH | | 1.33.1-r6 | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42378 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42379 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42379 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42380 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42380 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42381 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42381 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42382 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42382 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42383 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42383 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42384 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42384 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42385 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42385 | -+ +------------------+ + + +---------------------------------------+ -| | CVE-2021-42386 | | | | busybox: use-after-free in | -| | | | | | awk applet leads to denial | -| | | | | | of service and possibly... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42386 | -+ +------------------+----------+ +---------------+---------------------------------------+ -| | CVE-2021-42374 | MEDIUM | | 1.33.1-r4 | busybox: out-of-bounds read | -| | | | | | in unlzma applet leads to | -| | | | | | information leak and denial... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42374 | -+ +------------------+ + +---------------+---------------------------------------+ -| | CVE-2021-42375 | | | 1.33.1-r5 | busybox: incorrect handling | -| | | | | | of a special element in | -| | | | | | ash applet leads to... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-42375 | -+------------+------------------+----------+-------------------+---------------+---------------------------------------+ -``` - -**Container: tccr.io/truecharts/jackett:v0.20.83@sha256:b24ade69bfc1b9725c42043c0b4aab341aed7c2cb462fdc21bb5287aaa574d79** - -``` -2021-12-03T18:33:24.300Z INFO Detected OS: ubuntu -2021-12-03T18:33:24.300Z INFO Detecting Ubuntu vulnerabilities... -2021-12-03T18:33:24.303Z INFO Number of language-specific files: 1 -2021-12-03T18:33:24.303Z INFO Detecting gobinary vulnerabilities... - -tccr.io/truecharts/jackett:v0.20.83@sha256:b24ade69bfc1b9725c42043c0b4aab341aed7c2cb462fdc21bb5287aaa574d79 (ubuntu 20.04) -========================================================================================================================== -Total: 76 (UNKNOWN: 0, LOW: 52, MEDIUM: 24, HIGH: 0, CRITICAL: 0) - -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| bash | CVE-2019-18276 | LOW | 5.0-6ubuntu1.1 | | bash: when effective UID is not | -| | | | | | equal to its real UID the... | -| | | | | | -->avd.aquasec.com/nvd/cve-2019-18276 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| bind9-dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | bind: Lame cache can be abused to | -| | | | | | severely degrade resolver performance | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-25219 | -+----------------------+ + + + + + -| bind9-host | | | | | | -| | | | | | | -| | | | | | | -+----------------------+ + + + + + -| bind9-libs | | | | | | -| | | | | | | -| | | | | | | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | coreutils: Non-privileged | -| | | | | | session can escape to the | -| | | | | | parent session in chroot | -| | | | | | -->avd.aquasec.com/nvd/cve-2016-2781 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | bind: Lame cache can be abused to | -| | | | | | severely degrade resolver performance | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-25219 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference | -| | | | | | on missing sname in TGS-REQ | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | glibc: Arbitrary read in wordexp() | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-35942 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-38604 | | | | glibc: NULL pointer dereference in | -| | | | | | helper_thread() in mq_notify.c while | -| | | | | | handling NOTIFY_REMOVED messages... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-38604 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2016-10228 | LOW | | | glibc: iconv program can hang | -| | | | | | when invoked with the -c option | -| | | | | | -->avd.aquasec.com/nvd/cve-2016-10228 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2019-25013 | | | | glibc: buffer over-read in | -| | | | | | iconv when processing invalid | -| | | | | | multi-byte input sequences in... | -| | | | | | -->avd.aquasec.com/nvd/cve-2019-25013 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-27618 | | | | glibc: iconv when processing | -| | | | | | invalid multi-byte input | -| | | | | | sequences fails to advance the... | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-27618 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-29562 | | | | glibc: assertion failure in iconv | -| | | | | | when converting invalid UCS4 | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-29562 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-6096 | | | | glibc: signed comparison | -| | | | | | vulnerability in the | -| | | | | | ARMv7 memcpy function | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-6096 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-27645 | | | | glibc: Use-after-free in | -| | | | | | addgetnetgrentX function | -| | | | | | in netgroupcache.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-27645 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-3326 | | | | glibc: Assertion failure in | -| | | | | | ISO-2022-JP-3 gconv module | -| | | | | | related to combining characters | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3326 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-33574 | | | | glibc: mq_notify does | -| | | | | | not handle separately | -| | | | | | allocated thread attributes | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-33574 | -+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+ -| libc6 | CVE-2021-35942 | MEDIUM | | | glibc: Arbitrary read in wordexp() | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-35942 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-38604 | | | | glibc: NULL pointer dereference in | -| | | | | | helper_thread() in mq_notify.c while | -| | | | | | handling NOTIFY_REMOVED messages... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-38604 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2016-10228 | LOW | | | glibc: iconv program can hang | -| | | | | | when invoked with the -c option | -| | | | | | -->avd.aquasec.com/nvd/cve-2016-10228 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2019-25013 | | | | glibc: buffer over-read in | -| | | | | | iconv when processing invalid | -| | | | | | multi-byte input sequences in... | -| | | | | | -->avd.aquasec.com/nvd/cve-2019-25013 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-27618 | | | | glibc: iconv when processing | -| | | | | | invalid multi-byte input | -| | | | | | sequences fails to advance the... | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-27618 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-29562 | | | | glibc: assertion failure in iconv | -| | | | | | when converting invalid UCS4 | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-29562 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-6096 | | | | glibc: signed comparison | -| | | | | | vulnerability in the | -| | | | | | ARMv7 memcpy function | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-6096 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-27645 | | | | glibc: Use-after-free in | -| | | | | | addgetnetgrentX function | -| | | | | | in netgroupcache.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-27645 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-3326 | | | | glibc: Assertion failure in | -| | | | | | ISO-2022-JP-3 gconv module | -| | | | | | related to combining characters | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3326 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-33574 | | | | glibc: mq_notify does | -| | | | | | not handle separately | -| | | | | | allocated thread attributes | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-33574 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| libgmp10 | CVE-2021-43618 | | 2:6.2.0+dfsg-4 | | gmp: Integer overflow and resultant | -| | | | | | buffer overflow via crafted input | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-43618 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | krb5: Sending a request containing | -| | | | | | PA-ENCRYPTED-CHALLENGE padata | -| | | | | | element without using FAST could... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2018-5709 | LOW | | | krb5: integer overflow | -| | | | | | in dbentry->n_key_data | -| | | | | | in kadmin/dbutil/dump.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| libgssapi3-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference | -| | | | | | on missing sname in TGS-REQ | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 | -+----------------------+ + + +-------------------------+ + -| libhcrypto4-heimdal | | | | | | -| | | | | | | -| | | | | | | -+----------------------+ + + +-------------------------+ + -| libheimbase1-heimdal | | | | | | -| | | | | | | -| | | | | | | -+----------------------+ + + +-------------------------+ + -| libheimntlm0-heimdal | | | | | | -| | | | | | | -| | | | | | | -+----------------------+ + + +-------------------------+ + -| libhx509-5-heimdal | | | | | | -| | | | | | | -| | | | | | | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | krb5: Sending a request containing | -| | | | | | PA-ENCRYPTED-CHALLENGE padata | -| | | | | | element without using FAST could... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2018-5709 | LOW | | | krb5: integer overflow | -| | | | | | in dbentry->n_key_data | -| | | | | | in kadmin/dbutil/dump.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| libkrb5-26-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference | -| | | | | | on missing sname in TGS-REQ | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | krb5: Sending a request containing | -| | | | | | PA-ENCRYPTED-CHALLENGE padata | -| | | | | | element without using FAST could... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2018-5709 | LOW | | | krb5: integer overflow | -| | | | | | in dbentry->n_key_data | -| | | | | | in kadmin/dbutil/dump.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 | -+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+ -| libkrb5support0 | CVE-2021-36222 | MEDIUM | | | krb5: Sending a request containing | -| | | | | | PA-ENCRYPTED-CHALLENGE padata | -| | | | | | element without using FAST could... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2018-5709 | LOW | | | krb5: integer overflow | -| | | | | | in dbentry->n_key_data | -| | | | | | in kadmin/dbutil/dump.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| libpcre3 | CVE-2017-11164 | | 2:8.39-12build1 | | pcre: OP_KETRMAX feature in the | -| | | | | | match function in pcre_exec.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2017-11164 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2019-20838 | | | | pcre: Buffer over-read in JIT | -| | | | | | when UTF is disabled and \X or... | -| | | | | | -->avd.aquasec.com/nvd/cve-2019-20838 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-14155 | | | | pcre: Integer overflow when | -| | | | | | parsing callout numeric arguments | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-14155 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| libpython3.8-minimal | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input | -| | | | | | validation of octal strings | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-3737 | | | | python: urllib: HTTP client | -| | | | | | possible infinite loop on | -| | | | | | a 100 Continue response... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2021-23336 | LOW | | | python: Web cache poisoning | -| | | | | | via urllib.parse.parse_qsl | -| | | | | | and urllib.parse.parse_qs | -| | | | | | by using a semicolon... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 | -+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+ -| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input | -| | | | | | validation of octal strings | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-3737 | | | | python: urllib: HTTP client | -| | | | | | possible infinite loop on | -| | | | | | a 100 Continue response... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2021-23336 | LOW | | | python: Web cache poisoning | -| | | | | | via urllib.parse.parse_qsl | -| | | | | | and urllib.parse.parse_qs | -| | | | | | by using a semicolon... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| libroken18-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference | -| | | | | | on missing sname in TGS-REQ | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | | An out-of-bounds read was | -| | | | | | addressed with improved bounds | -| | | | | | checking. This issue is... | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-9794 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2020-9849 | LOW | | | An information disclosure issue | -| | | | | | was addressed with improved | -| | | | | | state management. This issue... | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-9849 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-9991 | | | | This issue was addressed | -| | | | | | with improved checks. | -| | | | | | This issue is fixed in... | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-9991 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| libtasn1-6 | CVE-2018-1000654 | | 4.16.0-2 | | libtasn1: Infinite loop in | -| | | | | | _asn1_expand_object_id(ptree) | -| | | | | | leads to memory exhaustion | -| | | | | | -->avd.aquasec.com/nvd/cve-2018-1000654 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| libwind0-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference | -| | | | | | on missing sname in TGS-REQ | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | glibc: Arbitrary read in wordexp() | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-35942 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-38604 | | | | glibc: NULL pointer dereference in | -| | | | | | helper_thread() in mq_notify.c while | -| | | | | | handling NOTIFY_REMOVED messages... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-38604 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2016-10228 | LOW | | | glibc: iconv program can hang | -| | | | | | when invoked with the -c option | -| | | | | | -->avd.aquasec.com/nvd/cve-2016-10228 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2019-25013 | | | | glibc: buffer over-read in | -| | | | | | iconv when processing invalid | -| | | | | | multi-byte input sequences in... | -| | | | | | -->avd.aquasec.com/nvd/cve-2019-25013 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-27618 | | | | glibc: iconv when processing | -| | | | | | invalid multi-byte input | -| | | | | | sequences fails to advance the... | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-27618 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-29562 | | | | glibc: assertion failure in iconv | -| | | | | | when converting invalid UCS4 | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-29562 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2020-6096 | | | | glibc: signed comparison | -| | | | | | vulnerability in the | -| | | | | | ARMv7 memcpy function | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-6096 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-27645 | | | | glibc: Use-after-free in | -| | | | | | addgetnetgrentX function | -| | | | | | in netgroupcache.c | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-27645 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-3326 | | | | glibc: Assertion failure in | -| | | | | | ISO-2022-JP-3 gconv module | -| | | | | | related to combining characters | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3326 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-33574 | | | | glibc: mq_notify does | -| | | | | | not handle separately | -| | | | | | allocated thread attributes | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-33574 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| login | CVE-2013-4235 | | 1:4.8.1-1ubuntu5.20.04.1 | | shadow-utils: TOCTOU race | -| | | | | | conditions by copying and | -| | | | | | removing directory trees | -| | | | | | -->avd.aquasec.com/nvd/cve-2013-4235 | -+----------------------+ + + +-------------------------+ + -| passwd | | | | | | -| | | | | | | -| | | | | | | -| | | | | | | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ -| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | [Signature Verification Bypass] | -| | | | | | -->avd.aquasec.com/nvd/cve-2020-16156 | -+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+ -| python3.8 | CVE-2021-29921 | | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input | -| | | | | | validation of octal strings | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-3737 | | | | python: urllib: HTTP client | -| | | | | | possible infinite loop on | -| | | | | | a 100 Continue response... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2021-23336 | LOW | | | python: Web cache poisoning | -| | | | | | via urllib.parse.parse_qsl | -| | | | | | and urllib.parse.parse_qs | -| | | | | | by using a semicolon... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 | -+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+ -| python3.8-minimal | CVE-2021-29921 | MEDIUM | | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input | -| | | | | | validation of octal strings | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 | -+ +------------------+ + +-------------------------+-----------------------------------------+ -| | CVE-2021-3737 | | | | python: urllib: HTTP client | -| | | | | | possible infinite loop on | -| | | | | | a 100 Continue response... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 | -+ +------------------+----------+ +-------------------------+-----------------------------------------+ -| | CVE-2021-23336 | LOW | | | python: Web cache poisoning | -| | | | | | via urllib.parse.parse_qsl | -| | | | | | and urllib.parse.parse_qs | -| | | | | | by using a semicolon... | -| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 | -+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+ - -usr/local/bin/micro (gobinary) -============================== -Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0) - -+------------------+------------------+----------+-------------------+---------------+---------------------------------------+ -| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | -+------------------+------------------+----------+-------------------+---------------+---------------------------------------+ -| gopkg.in/yaml.v2 | CVE-2019-11254 | MEDIUM | v2.2.7 | v2.2.8 | kubernetes: Denial of | -| | | | | | service in API server via | -| | | | | | crafted YAML payloads by... | -| | | | | | -->avd.aquasec.com/nvd/cve-2019-11254 | -+------------------+------------------+----------+-------------------+---------------+---------------------------------------+ -``` diff --git a/stable/jackett/9.0.32/CHANGELOG.md b/stable/jackett/9.0.33/CHANGELOG.md similarity index 91% rename from stable/jackett/9.0.32/CHANGELOG.md rename to stable/jackett/9.0.33/CHANGELOG.md index 19f2bbe56e4..bc6d6e840b9 100644 --- a/stable/jackett/9.0.32/CHANGELOG.md +++ b/stable/jackett/9.0.33/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [jackett-9.0.33](https://github.com/truecharts/apps/compare/jackett-9.0.32...jackett-9.0.33) (2021-12-04) + +#### Chore + +* cleanup the ci for the security page a bit + + + ### [jackett-9.0.32](https://github.com/truecharts/apps/compare/jackett-9.0.31...jackett-9.0.32) (2021-12-04) @@ -88,12 +97,3 @@ - -### [jackett-9.0.21](https://github.com/truecharts/apps/compare/jackett-9.0.20...jackett-9.0.21) (2021-11-22) - -#### Chore - -* update non-major ([#1380](https://github.com/truecharts/apps/issues/1380)) - -#### Fix - diff --git a/stable/jackett/9.0.32/CONFIG.md b/stable/jackett/9.0.33/CONFIG.md similarity index 100% rename from stable/jackett/9.0.32/CONFIG.md rename to stable/jackett/9.0.33/CONFIG.md diff --git a/stable/jackett/9.0.32/Chart.lock b/stable/jackett/9.0.33/Chart.lock similarity index 78% rename from stable/jackett/9.0.32/Chart.lock rename to stable/jackett/9.0.33/Chart.lock index bc1da6dc381..1c938a616ba 100644 --- a/stable/jackett/9.0.32/Chart.lock +++ b/stable/jackett/9.0.33/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.10 digest: sha256:76ef16a78cbfe53b0be5d9fac03039063f57b2b43f927e4cbfed13be1c939fcc -generated: "2021-12-04T22:02:34.16799824Z" +generated: "2021-12-04T22:22:20.831525987Z" diff --git a/stable/jackett/9.0.32/Chart.yaml b/stable/jackett/9.0.33/Chart.yaml similarity index 97% rename from stable/jackett/9.0.32/Chart.yaml rename to stable/jackett/9.0.33/Chart.yaml index 0c4b5c3f575..3534770a3b5 100644 --- a/stable/jackett/9.0.32/Chart.yaml +++ b/stable/jackett/9.0.33/Chart.yaml @@ -21,7 +21,7 @@ name: jackett sources: - https://github.com/Jackett/Jackett type: application -version: 9.0.32 +version: 9.0.33 annotations: truecharts.org/catagories: | - media diff --git a/stable/jackett/9.0.32/README.md b/stable/jackett/9.0.33/README.md similarity index 100% rename from stable/jackett/9.0.32/README.md rename to stable/jackett/9.0.33/README.md diff --git a/stable/jackett/9.0.32/app-readme.md b/stable/jackett/9.0.33/app-readme.md similarity index 100% rename from stable/jackett/9.0.32/app-readme.md rename to stable/jackett/9.0.33/app-readme.md diff --git a/stable/jackett/9.0.32/charts/common-8.9.10.tgz b/stable/jackett/9.0.33/charts/common-8.9.10.tgz similarity index 100% rename from stable/jackett/9.0.32/charts/common-8.9.10.tgz rename to stable/jackett/9.0.33/charts/common-8.9.10.tgz diff --git a/stable/jackett/9.0.32/helm-values.md b/stable/jackett/9.0.33/helm-values.md similarity index 100% rename from stable/jackett/9.0.32/helm-values.md rename to stable/jackett/9.0.33/helm-values.md diff --git a/stable/jackett/9.0.32/ix_values.yaml b/stable/jackett/9.0.33/ix_values.yaml similarity index 100% rename from stable/jackett/9.0.32/ix_values.yaml rename to stable/jackett/9.0.33/ix_values.yaml diff --git a/stable/jackett/9.0.32/questions.yaml b/stable/jackett/9.0.33/questions.yaml similarity index 100% rename from stable/jackett/9.0.32/questions.yaml rename to stable/jackett/9.0.33/questions.yaml diff --git a/stable/jackett/9.0.32/security.md b/stable/jackett/9.0.33/security.md similarity index 99% rename from stable/jackett/9.0.32/security.md rename to stable/jackett/9.0.33/security.md index 6a1b63f6bcf..d229542b9ef 100644 --- a/stable/jackett/9.0.32/security.md +++ b/stable/jackett/9.0.33/security.md @@ -1,3 +1,8 @@ +--- +hide: + - toc +--- + # Security Scan ## Helm-Chart diff --git a/stable/jackett/9.0.32/templates/common.yaml b/stable/jackett/9.0.33/templates/common.yaml similarity index 100% rename from stable/jackett/9.0.32/templates/common.yaml rename to stable/jackett/9.0.33/templates/common.yaml diff --git a/stable/jackett/9.0.32/values.yaml b/stable/jackett/9.0.33/values.yaml similarity index 100% rename from stable/jackett/9.0.32/values.yaml rename to stable/jackett/9.0.33/values.yaml