Commit new App releases for TrueCharts
Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
parent
1f8621bee2
commit
0f95a9048e
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="prometheus-1.1.26"></a>
|
||||
### [prometheus-1.1.26](https://github.com/truecharts/apps/compare/prometheus-1.1.25...prometheus-1.1.26) (2021-12-20)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major ([#1589](https://github.com/truecharts/apps/issues/1589))
|
||||
|
||||
|
||||
|
||||
<a name="prometheus-1.1.25"></a>
|
||||
### [prometheus-1.1.25](https://github.com/truecharts/apps/compare/prometheus-1.1.24...prometheus-1.1.25) (2021-12-20)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
#### Chore
|
||||
|
||||
* update docker general non-major ([#1518](https://github.com/truecharts/apps/issues/1518))
|
||||
|
||||
|
||||
|
||||
<a name="prometheus-1.1.15"></a>
|
||||
### [prometheus-1.1.15](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-2.0.0...prometheus-1.1.15) (2021-12-11)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update general helm non-major helm releases ([#1509](https://github.com/truecharts/apps/issues/1509))
|
|
@ -9,4 +9,4 @@ dependencies:
|
|||
repository: https://charts.bitnami.com/bitnami
|
||||
version: 2.1.19
|
||||
digest: sha256:9996c081f33e1a636bcbb3b060bcb8ea425ad59e6bf5c808f6e88c2a3e136ab1
|
||||
generated: "2021-12-20T13:18:36.855170175Z"
|
||||
generated: "2021-12-20T17:55:21.60488417Z"
|
|
@ -28,7 +28,7 @@ sources:
|
|||
- https://github.com/prometheus-community/helm-charts
|
||||
- https://github.com/prometheus-operator/kube-prometheus
|
||||
type: application
|
||||
version: 1.1.25
|
||||
version: 1.1.26
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- metrics
|
|
@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| prometheus.volumes | list | `[]` | |
|
||||
| prometheus.walCompression | bool | `false` | |
|
||||
| prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | |
|
||||
| prometheusImage.tag | string | `"v2.32.1@sha256:4f9d5b933b1576a91d857c1289c350e3ba0d67928d4a86d0fc62d16c28ed19f0"` | |
|
||||
| prometheusImage.tag | string | `"v2.32.1@sha256:98e8a2e885ae6b8b9625fc0c987d30b5040ce921f46af2f7ba70c2edb42b4eee"` | |
|
||||
| rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created |
|
||||
| securityContext.readOnlyRootFilesystem | bool | `false` | |
|
||||
| service.alertmanager.enabled | bool | `true` | |
|
|
@ -4,7 +4,7 @@ image:
|
|||
|
||||
prometheusImage:
|
||||
repository: tccr.io/truecharts/prometheus
|
||||
tag: v2.32.1@sha256:4f9d5b933b1576a91d857c1289c350e3ba0d67928d4a86d0fc62d16c28ed19f0
|
||||
tag: v2.32.1@sha256:98e8a2e885ae6b8b9625fc0c987d30b5040ce921f46af2f7ba70c2edb42b4eee
|
||||
|
||||
thanosImage:
|
||||
repository: tccr.io/truecharts/thanos
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="omada-controller-4.0.36"></a>
|
||||
### [omada-controller-4.0.36](https://github.com/truecharts/apps/compare/omada-controller-4.0.35...omada-controller-4.0.36) (2021-12-20)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major ([#1589](https://github.com/truecharts/apps/issues/1589))
|
||||
|
||||
|
||||
|
||||
<a name="omada-controller-4.0.35"></a>
|
||||
### [omada-controller-4.0.35](https://github.com/truecharts/apps/compare/omada-controller-4.0.34...omada-controller-4.0.35) (2021-12-19)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
<a name="omada-controller-4.0.26"></a>
|
||||
### [omada-controller-4.0.26](https://github.com/truecharts/apps/compare/omada-controller-4.0.25...omada-controller-4.0.26) (2021-12-07)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update non-major deps helm releases ([#1481](https://github.com/truecharts/apps/issues/1481))
|
||||
|
||||
|
||||
|
||||
<a name="omada-controller-4.0.25"></a>
|
||||
### omada-controller-4.0.25 (2021-12-05)
|
||||
|
|
@ -3,4 +3,4 @@ dependencies:
|
|||
repository: https://truecharts.org
|
||||
version: 8.9.24
|
||||
digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c
|
||||
generated: "2021-12-19T23:05:08.814365937Z"
|
||||
generated: "2021-12-20T17:55:13.524186961Z"
|
|
@ -18,7 +18,7 @@ name: omada-controller
|
|||
sources:
|
||||
- https://github.com/mbentley/docker-omada-controller
|
||||
- https://github.com/truechartsapps/tree/master/charts/omada-controller
|
||||
version: 4.0.35
|
||||
version: 4.0.36
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- media
|
|
@ -15,7 +15,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| env.TZ | string | `"UTC"` | Set the container timezone |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
|
||||
| image.repository | string | `"tccr.io/truecharts/omada-controller"` | image repository |
|
||||
| image.tag | string | `"v4.4@sha256:86ca3f429fd54411b9d0727453fcb4b02079cdf388a90b2051e4c1b7c51d88f6"` | image tag |
|
||||
| image.tag | string | `"v4.4@sha256:f4606fad1759210d5082d824f00c5fb89ff6ece428934fa23bda7605f2a7c0b3"` | image tag |
|
||||
| persistence | object | See values.yaml | Configure persistence settings for the chart under this key. |
|
||||
| podSecurityContext.runAsGroup | int | `0` | |
|
||||
| podSecurityContext.runAsUser | int | `0` | |
|
|
@ -2,7 +2,7 @@ image:
|
|||
# -- image repository
|
||||
repository: tccr.io/truecharts/omada-controller
|
||||
# -- image tag
|
||||
tag: v4.4@sha256:86ca3f429fd54411b9d0727453fcb4b02079cdf388a90b2051e4c1b7c51d88f6
|
||||
tag: v4.4@sha256:f4606fad1759210d5082d824f00c5fb89ff6ece428934fa23bda7605f2a7c0b3
|
||||
# -- image pull policy
|
||||
pullPolicy: IfNotPresent
|
||||
|
File diff suppressed because one or more lines are too long
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="bazarr-9.0.28"></a>
|
||||
### [bazarr-9.0.28](https://github.com/truecharts/apps/compare/bazarr-9.0.27...bazarr-9.0.28) (2021-12-20)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major ([#1589](https://github.com/truecharts/apps/issues/1589))
|
||||
|
||||
|
||||
|
||||
<a name="bazarr-9.0.27"></a>
|
||||
### [bazarr-9.0.27](https://github.com/truecharts/apps/compare/bazarr-9.0.26...bazarr-9.0.27) (2021-12-19)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
|
||||
<a name="bazarr-9.0.19"></a>
|
||||
### [bazarr-9.0.19](https://github.com/truecharts/apps/compare/bazarr-9.0.18...bazarr-9.0.19) (2021-12-05)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update non-major deps helm releases ([#1468](https://github.com/truecharts/apps/issues/1468))
|
||||
|
||||
|
||||
|
||||
<a name="bazarr-9.0.18"></a>
|
||||
### [bazarr-9.0.18](https://github.com/truecharts/apps/compare/bazarr-9.0.17...bazarr-9.0.18) (2021-12-04)
|
|
@ -3,4 +3,4 @@ dependencies:
|
|||
repository: https://truecharts.org
|
||||
version: 8.9.24
|
||||
digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c
|
||||
generated: "2021-12-19T23:21:48.274801432Z"
|
||||
generated: "2021-12-20T17:55:13.589522838Z"
|
|
@ -26,7 +26,7 @@ sources:
|
|||
- https://github.com/morpheus65535/bazarr
|
||||
- https://hub.docker.com/r/linuxserver/bazarr
|
||||
type: application
|
||||
version: 9.0.27
|
||||
version: 9.0.28
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- media
|
|
@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| env | object | `{}` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/bazarr"` | |
|
||||
| image.tag | string | `"v1.0.1@sha256:b6d3d33d3f964e4de7563096f07476f9f2c990f2268e1f9814d3281c3181111e"` | |
|
||||
| image.tag | string | `"v1.0.1@sha256:7688d7ee3c2bf867cbfc9994a43e64ba65692ea6e93c23a11877bc686fd2e608"` | |
|
||||
| persistence.config.enabled | bool | `true` | |
|
||||
| persistence.config.mountPath | string | `"/config"` | |
|
||||
| service.main.ports.main.port | int | `6767` | |
|
|
@ -1,7 +1,7 @@
|
|||
image:
|
||||
repository: tccr.io/truecharts/bazarr
|
||||
pullPolicy: IfNotPresent
|
||||
tag: v1.0.1@sha256:b6d3d33d3f964e4de7563096f07476f9f2c990f2268e1f9814d3281c3181111e
|
||||
tag: v1.0.1@sha256:7688d7ee3c2bf867cbfc9994a43e64ba65692ea6e93c23a11877bc686fd2e608
|
||||
|
||||
service:
|
||||
main:
|
File diff suppressed because one or more lines are too long
|
@ -1,6 +1,11 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="emulatorjs-0.0.8"></a>
|
||||
### [emulatorjs-0.0.8](https://github.com/truecharts/apps/compare/emulatorjs-0.0.7...emulatorjs-0.0.8) (2021-12-20)
|
||||
|
||||
|
||||
|
||||
<a name="emulatorjs-0.0.7"></a>
|
||||
### [emulatorjs-0.0.7](https://github.com/truecharts/apps/compare/emulatorjs-0.0.6...emulatorjs-0.0.7) (2021-12-19)
|
||||
|
|
@ -3,4 +3,4 @@ dependencies:
|
|||
repository: https://truecharts.org
|
||||
version: 8.9.24
|
||||
digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c
|
||||
generated: "2021-12-19T23:07:29.954946508Z"
|
||||
generated: "2021-12-20T17:55:13.592985432Z"
|
|
@ -1,7 +1,7 @@
|
|||
apiVersion: v2
|
||||
kubeVersion: ">=1.16.0-0"
|
||||
name: emulatorjs
|
||||
version: 0.0.7
|
||||
version: 0.0.8
|
||||
appVersion: "1.4.2"
|
||||
description: Emulatorjs - In browser web based emulation portable to nearly any device for many retro consoles.
|
||||
type: application
|
|
@ -20,6 +20,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| persistence.varrun.enabled | bool | `true` | |
|
||||
| podSecurityContext.runAsGroup | int | `0` | |
|
||||
| podSecurityContext.runAsUser | int | `0` | |
|
||||
| securityContext.readOnlyRootFilesystem | bool | `false` | |
|
||||
| securityContext.runAsNonRoot | bool | `false` | |
|
||||
| service.front.enabled | bool | `true` | |
|
||||
| service.front.ports.front.enabled | bool | `true` | |
|
|
@ -5,6 +5,7 @@ image:
|
|||
|
||||
securityContext:
|
||||
runAsNonRoot: false
|
||||
readOnlyRootFilesystem: false
|
||||
|
||||
podSecurityContext:
|
||||
runAsUser: 0
|
|
@ -1493,7 +1493,7 @@ questions:
|
|||
label: "ReadOnly Root Filesystem"
|
||||
schema:
|
||||
type: boolean
|
||||
default: true
|
||||
default: false
|
||||
- variable: allowPrivilegeEscalation
|
||||
label: "Allow Privilege Escalation"
|
||||
schema:
|
|
@ -21,6 +21,7 @@ hide:
|
|||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'RELEASE-NAME-emulatorjs' of Deployment 'RELEASE-NAME-emulatorjs' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
|
||||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-emulatorjs' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
|
||||
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | <details><summary>Expand...</summary> It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-emulatorjs' should specify an image tag </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/configuration/overview/#container-images">https://kubernetes.io/docs/concepts/configuration/overview/#container-images</a><br><a href="https://avd.aquasec.com/appshield/ksv013">https://avd.aquasec.com/appshield/ksv013</a><br></details> |
|
||||
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container 'RELEASE-NAME-emulatorjs' of Deployment 'RELEASE-NAME-emulatorjs' should set 'securityContext.readOnlyRootFilesystem' to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
|
||||
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | <details><summary>Expand...</summary> An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-emulatorjs' should set 'securityContext.readOnlyRootFilesystem' to true </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/">https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/</a><br><a href="https://avd.aquasec.com/appshield/ksv014">https://avd.aquasec.com/appshield/ksv014</a><br></details> |
|
||||
| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM | <details><summary>Expand...</summary> A program inside the container can bypass Seccomp protection policies. <br> <hr> <br> Container 'RELEASE-NAME-emulatorjs' of Deployment 'RELEASE-NAME-emulatorjs' should specify a seccomp profile </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/">https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/</a><br><a href="https://avd.aquasec.com/appshield/ksv019">https://avd.aquasec.com/appshield/ksv019</a><br></details> |
|
||||
| Kubernetes Security Check | KSV019 | Seccomp policies disabled | MEDIUM | <details><summary>Expand...</summary> A program inside the container can bypass Seccomp protection policies. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-emulatorjs' should specify a seccomp profile </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/">https://kubesec.io/basics/metadata-annotations-container-seccomp-security-alpha-kubernetes-io-pod/</a><br><a href="https://avd.aquasec.com/appshield/ksv019">https://avd.aquasec.com/appshield/ksv019</a><br></details> |
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="lazylibrarian-9.0.34"></a>
|
||||
### [lazylibrarian-9.0.34](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.33...lazylibrarian-9.0.34) (2021-12-20)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major ([#1589](https://github.com/truecharts/apps/issues/1589))
|
||||
|
||||
|
||||
|
||||
<a name="lazylibrarian-9.0.33"></a>
|
||||
### [lazylibrarian-9.0.33](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.32...lazylibrarian-9.0.33) (2021-12-19)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
<a name="lazylibrarian-9.0.24"></a>
|
||||
### [lazylibrarian-9.0.24](https://github.com/truecharts/apps/compare/lazylibrarian-9.0.23...lazylibrarian-9.0.24) (2021-12-07)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update non-major ([#1479](https://github.com/truecharts/apps/issues/1479))
|
||||
|
||||
|
||||
|
||||
<a name="lazylibrarian-9.0.23"></a>
|
||||
### lazylibrarian-9.0.23 (2021-12-05)
|
||||
|
|
@ -3,4 +3,4 @@ dependencies:
|
|||
repository: https://truecharts.org
|
||||
version: 8.9.24
|
||||
digest: sha256:1496c228986729d8cb70f0dd54bedbe7987b6ea0809484b4f4a394e26df9343c
|
||||
generated: "2021-12-19T23:13:56.073108139Z"
|
||||
generated: "2021-12-20T17:55:41.46482927Z"
|
|
@ -21,7 +21,7 @@ sources:
|
|||
- https://gitlab.com/LazyLibrarian/LazyLibrarian.git
|
||||
- https://lazylibrarian.gitlab.io
|
||||
type: application
|
||||
version: 9.0.33
|
||||
version: 9.0.34
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- media
|
|
@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| env | object | `{}` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/lazylibrarian"` | |
|
||||
| image.tag | string | `"latest@sha256:615afa736606cf0c3059ba357722d0aebfc7fd96891c8f3b44480ab6216a7f35"` | |
|
||||
| image.tag | string | `"latest@sha256:5f480dbc9b63036a8ff59295398a60e5c02c403cebed7d429a51b651e1ed8b65"` | |
|
||||
| persistence.config.enabled | bool | `true` | |
|
||||
| persistence.config.mountPath | string | `"/config"` | |
|
||||
| persistence.varrun.enabled | bool | `true` | |
|
|
@ -1,7 +1,7 @@
|
|||
image:
|
||||
repository: tccr.io/truecharts/lazylibrarian
|
||||
pullPolicy: IfNotPresent
|
||||
tag: latest@sha256:615afa736606cf0c3059ba357722d0aebfc7fd96891c8f3b44480ab6216a7f35
|
||||
tag: latest@sha256:5f480dbc9b63036a8ff59295398a60e5c02c403cebed7d429a51b651e1ed8b65
|
||||
|
||||
securityContext:
|
||||
runAsNonRoot: false
|
|
@ -36,7 +36,7 @@ hide:
|
|||
##### Detected Containers
|
||||
|
||||
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
|
||||
tccr.io/truecharts/lazylibrarian:latest@sha256:615afa736606cf0c3059ba357722d0aebfc7fd96891c8f3b44480ab6216a7f35
|
||||
tccr.io/truecharts/lazylibrarian:latest@sha256:5f480dbc9b63036a8ff59295398a60e5c02c403cebed7d429a51b651e1ed8b65
|
||||
|
||||
##### Scan Results
|
||||
|
||||
|
@ -73,7 +73,7 @@ hide:
|
|||
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | <details><summary>Expand...</summary><a href="https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/">https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/</a><br></details> |
|
||||
|
||||
|
||||
#### Container: tccr.io/truecharts/lazylibrarian:latest@sha256:615afa736606cf0c3059ba357722d0aebfc7fd96891c8f3b44480ab6216a7f35 (ubuntu 18.04)
|
||||
#### Container: tccr.io/truecharts/lazylibrarian:latest@sha256:5f480dbc9b63036a8ff59295398a60e5c02c403cebed7d429a51b651e1ed8b65 (ubuntu 18.04)
|
||||
|
||||
|
||||
**ubuntu**
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue