From 350f241072e78f61b3e6e5b0572ee0ef0d762b1c Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Fri, 14 Jan 2022 22:55:21 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- incubator/guacamole-client/0.0.1/CHANGELOG.md | 10 --- incubator/guacamole-client/0.0.2/CHANGELOG.md | 18 +++++ .../{0.0.1 => 0.0.2}/CONFIG.md | 0 .../{0.0.1 => 0.0.2}/Chart.lock | 2 +- .../{0.0.1 => 0.0.2}/Chart.yaml | 2 +- .../{0.0.1 => 0.0.2}/README.md | 0 .../{0.0.1 => 0.0.2}/app-readme.md | 0 .../{0.0.1 => 0.0.2}/charts/common-8.13.0.tgz | Bin .../charts/postgresql-6.0.49.tgz | Bin .../{0.0.1 => 0.0.2}/helm-values.md | 9 +-- .../{0.0.1 => 0.0.2}/ix_values.yaml | 67 ++++++++++++------ .../{0.0.1 => 0.0.2}/questions.yaml | 38 +++++----- .../{0.0.1 => 0.0.2}/security.md | 20 ++++++ .../{0.0.1 => 0.0.2}/templates/_configmap.tpl | 0 .../{0.0.1 => 0.0.2}/templates/common.yaml | 0 .../{0.0.1 => 0.0.2}/values.yaml | 0 16 files changed, 111 insertions(+), 55 deletions(-) delete mode 100644 incubator/guacamole-client/0.0.1/CHANGELOG.md create mode 100644 incubator/guacamole-client/0.0.2/CHANGELOG.md rename incubator/guacamole-client/{0.0.1 => 0.0.2}/CONFIG.md (100%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/Chart.lock (84%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/Chart.yaml (98%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/README.md (100%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/app-readme.md (100%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/charts/common-8.13.0.tgz (100%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/charts/postgresql-6.0.49.tgz (100%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/helm-values.md (74%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/ix_values.yaml (81%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/questions.yaml (99%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/security.md (99%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/templates/_configmap.tpl (100%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/templates/common.yaml (100%) rename incubator/guacamole-client/{0.0.1 => 0.0.2}/values.yaml (100%) diff --git a/incubator/guacamole-client/0.0.1/CHANGELOG.md b/incubator/guacamole-client/0.0.1/CHANGELOG.md deleted file mode 100644 index 730ea941722..00000000000 --- a/incubator/guacamole-client/0.0.1/CHANGELOG.md +++ /dev/null @@ -1,10 +0,0 @@ -# Changelog
- - - -### guacamole-client-0.0.1 (2022-01-14) - -#### Feat - -* Add guacamole-client ([#1696](https://github.com/truecharts/apps/issues/1696)) - diff --git a/incubator/guacamole-client/0.0.2/CHANGELOG.md b/incubator/guacamole-client/0.0.2/CHANGELOG.md new file mode 100644 index 00000000000..c8c4c0601b2 --- /dev/null +++ b/incubator/guacamole-client/0.0.2/CHANGELOG.md @@ -0,0 +1,18 @@ +# Changelog
+ + + +### [guacamole-client-0.0.2](https://github.com/truecharts/apps/compare/guacamole-client-0.0.1...guacamole-client-0.0.2) (2022-01-14) + +#### Fix + +* Use correct user on questions.yaml ([#1719](https://github.com/truecharts/apps/issues/1719)) + + + + +### guacamole-client-0.0.1 (2022-01-14) + +#### Feat + +* Add guacamole-client ([#1696](https://github.com/truecharts/apps/issues/1696)) diff --git a/incubator/guacamole-client/0.0.1/CONFIG.md b/incubator/guacamole-client/0.0.2/CONFIG.md similarity index 100% rename from incubator/guacamole-client/0.0.1/CONFIG.md rename to incubator/guacamole-client/0.0.2/CONFIG.md diff --git a/incubator/guacamole-client/0.0.1/Chart.lock b/incubator/guacamole-client/0.0.2/Chart.lock similarity index 84% rename from incubator/guacamole-client/0.0.1/Chart.lock rename to incubator/guacamole-client/0.0.2/Chart.lock index 04df4059db1..13cf401639e 100644 --- a/incubator/guacamole-client/0.0.1/Chart.lock +++ b/incubator/guacamole-client/0.0.2/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://truecharts.org/ version: 6.0.49 digest: sha256:24fc5f3fc25204765db5bb393a58d69caac9c342f538a0586a8f8b5b0a4bc60c -generated: "2022-01-14T08:35:51.317472737Z" +generated: "2022-01-14T22:50:38.434751155Z" diff --git a/incubator/guacamole-client/0.0.1/Chart.yaml b/incubator/guacamole-client/0.0.2/Chart.yaml similarity index 98% rename from incubator/guacamole-client/0.0.1/Chart.yaml rename to incubator/guacamole-client/0.0.2/Chart.yaml index 3d13f8ba238..eee28e94704 100644 --- a/incubator/guacamole-client/0.0.1/Chart.yaml +++ b/incubator/guacamole-client/0.0.2/Chart.yaml @@ -25,7 +25,7 @@ sources: - https://hub.docker.com/r/guacamole/guacamole - http://guacamole.incubator.apache.org/doc/gug/introduction.html type: application -version: 0.0.1 +version: 0.0.2 annotations: truecharts.org/catagories: | - utilities diff --git a/incubator/guacamole-client/0.0.1/README.md b/incubator/guacamole-client/0.0.2/README.md similarity index 100% rename from incubator/guacamole-client/0.0.1/README.md rename to incubator/guacamole-client/0.0.2/README.md diff --git a/incubator/guacamole-client/0.0.1/app-readme.md b/incubator/guacamole-client/0.0.2/app-readme.md similarity index 100% rename from incubator/guacamole-client/0.0.1/app-readme.md rename to incubator/guacamole-client/0.0.2/app-readme.md diff --git a/incubator/guacamole-client/0.0.1/charts/common-8.13.0.tgz b/incubator/guacamole-client/0.0.2/charts/common-8.13.0.tgz similarity index 100% rename from incubator/guacamole-client/0.0.1/charts/common-8.13.0.tgz rename to incubator/guacamole-client/0.0.2/charts/common-8.13.0.tgz diff --git a/incubator/guacamole-client/0.0.1/charts/postgresql-6.0.49.tgz b/incubator/guacamole-client/0.0.2/charts/postgresql-6.0.49.tgz similarity index 100% rename from incubator/guacamole-client/0.0.1/charts/postgresql-6.0.49.tgz rename to incubator/guacamole-client/0.0.2/charts/postgresql-6.0.49.tgz diff --git a/incubator/guacamole-client/0.0.1/helm-values.md b/incubator/guacamole-client/0.0.2/helm-values.md similarity index 74% rename from incubator/guacamole-client/0.0.1/helm-values.md rename to incubator/guacamole-client/0.0.2/helm-values.md index 4863dcd31ab..c7c9187c851 100644 --- a/incubator/guacamole-client/0.0.1/helm-values.md +++ b/incubator/guacamole-client/0.0.2/helm-values.md @@ -19,6 +19,7 @@ You will, however, be able to use all values referenced in the common chart here | env.POSTGRES_DATABASE | string | `"{{ .Values.postgresql.postgresqlDatabase }}"` | | | env.POSTGRES_PORT | int | `5432` | | | env.POSTGRES_USER | string | `"{{ .Values.postgresql.postgresqlUsername }}"` | | +| envFrom[0].configMapRef.name | string | `"guacamole-client-env"` | | | envValueFrom.POSTGRES_HOSTNAME.secretKeyRef.key | string | `"plainhost"` | | | envValueFrom.POSTGRES_HOSTNAME.secretKeyRef.name | string | `"dbcreds"` | | | envValueFrom.POSTGRES_PASSWORD.secretKeyRef.key | string | `"postgresql-password"` | | @@ -33,7 +34,7 @@ You will, however, be able to use all values referenced in the common chart here | initContainers.1-creat-initdb-file.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | | initContainers.1-creat-initdb-file.volumeMounts[0].mountPath | string | `"/initdbdata"` | | | initContainers.1-creat-initdb-file.volumeMounts[0].name | string | `"initdbdata"` | | -| initContainers.2-initdb.args[0] | string | `"echo \"Waiting for DB to be ready...\"; DBREADY=0; for i in {1..10}; do pg_isready -t 5 -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT;\n if [ $? -eq 0 ];\n then echo \"DB is ready!\";\n DBREADY=1;\n break;\n else echo \"DB not ready yet.\";\n fi;\n echo \"Waiting...\";\n sleep 5;\ndone; if [ $DBREADY -eq 1 ]; then echo \"Initializing DB's schema...\";\n psql -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT -a -w -f /initdbdata/initdb.sql;\n if [ $? -eq 0 ];\n then echo \"DB's schema initialized successfully!\";\n exit 0;\n else echo \"DB's schema failed to initialize.\";\n exit 1;\n fi;\nelse echo \"DB failed to start.\"; fi;\n"` | | +| initContainers.2-initdb.args[0] | string | `"echo \"Waiting for DB to be ready...\"; DBREADY=0; for i in {1..10}; do pg_isready -t 5 -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT;\n if [ $? -eq 0 ];\n then\n echo \"DB is ready!\";\n DBREADY=1;\n break;\n else\n echo \"DB not ready yet.\";\n fi;\n echo \"Waiting...\";\n sleep 5;\ndone; if [ $DBREADY -eq 1 ];\n then\n psql -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT -q -c 'SELECT * FROM public.guacamole_user';\n if [ $? -eq 0 ];\n then\n echo \"DB already initialized. Skipping...\";\n else\n echo \"Initializing DB's schema...\";\n psql -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT -a -w -f /initdbdata/initdb.sql;\n if [ $? -eq 0 ];\n then\n echo \"DB's schema initialized successfully!\";\n exit 0;\n else\n echo \"DB's schema failed to initialize.\";\n exit 1;\n fi;\n fi;\n else\n echo \"DB failed to start.\";\nfi;\n"` | | | initContainers.2-initdb.command[0] | string | `"/bin/sh"` | | | initContainers.2-initdb.command[1] | string | `"-c"` | | | initContainers.2-initdb.env[0].name | string | `"POSTGRES_DATABASE"` | | @@ -51,7 +52,7 @@ You will, however, be able to use all values referenced in the common chart here | initContainers.2-initdb.image | string | `"{{ .Values.postgresqlImage.repository }}:{{ .Values.postgresqlImage.tag }}"` | | | initContainers.2-initdb.volumeMounts[0].mountPath | string | `"/initdbdata"` | | | initContainers.2-initdb.volumeMounts[0].name | string | `"initdbdata"` | | -| initContainers.3-temp-hack.args[0] | string | `"echo \"Checing postgresql driver version...\"; if [ -e /opt/guacamole/postgresql/postgresql-42.2.24.jre7.jar ];\n then echo \"Version found is correct.\";\n exit 0;\n else echo \"Old version found. Will try to download a known-to-work version.\";\n echo \"Downloading (postgresql-42.2.24.jre7.jar)...\";\n curl -L \"https://jdbc.postgresql.org/download/postgresql-42.2.24.jre7.jar\" > \"/opt/guacamole/postgresql-hack/postgresql-42.2.24.jre7.jar\";\n if [ -e /opt/guacamole/postgresql-hack/postgresql-42.2.24.jre7.jar ];\n then echo \"Downloaded successfully!\";\n cp -r /opt/guacamole/postgresql/* /opt/guacamole/postgresql-hack/;\n if [ -e /opt/guacamole/postgresql-hack/postgresql-9.4-1201.jdbc41.jar ];\n then echo \"Removing old version... (postgresql-9.4-1201.jdbc41.jar)\";\n rm \"/opt/guacamole/postgresql-hack/postgresql-9.4-1201.jdbc41.jar\";\n if [ $? -eq 0 ];\n then echo \"Removed successfully!\";\n else \"Failed to remove.\";\n exit 1;\n fi;\n fi;\n else echo \"Failed to download.\";\n exit 1;\n fi;\nfi;\n"` | | +| initContainers.3-temp-hack.args[0] | string | `"echo \"Checing postgresql driver version...\"; if [ -e /opt/guacamole/postgresql/postgresql-42.2.24.jre7.jar ];\n then\n echo \"Version found is correct.\";\n exit 0;\n else\n echo \"Old version found. Will try to download a known-to-work version.\";\n echo \"Downloading (postgresql-42.2.24.jre7.jar)...\";\n curl -L \"https://jdbc.postgresql.org/download/postgresql-42.2.24.jre7.jar\" > \"/opt/guacamole/postgresql-hack/postgresql-42.2.24.jre7.jar\";\n if [ -e /opt/guacamole/postgresql-hack/postgresql-42.2.24.jre7.jar ];\n then\n echo \"Downloaded successfully!\";\n cp -r /opt/guacamole/postgresql/* /opt/guacamole/postgresql-hack/;\n if [ -e /opt/guacamole/postgresql-hack/postgresql-9.4-1201.jdbc41.jar ];\n then\n echo \"Removing old version... (postgresql-9.4-1201.jdbc41.jar)\";\n rm \"/opt/guacamole/postgresql-hack/postgresql-9.4-1201.jdbc41.jar\";\n if [ $? -eq 0 ];\n then\n echo \"Removed successfully!\";\n else\n echo \"Failed to remove.\";\n exit 1;\n fi;\n fi;\n else\n echo \"Failed to download.\";\n exit 1;\n fi;\nfi;\n"` | | | initContainers.3-temp-hack.command[0] | string | `"/bin/sh"` | | | initContainers.3-temp-hack.command[1] | string | `"-c"` | | | initContainers.3-temp-hack.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | @@ -59,7 +60,7 @@ You will, however, be able to use all values referenced in the common chart here | initContainers.3-temp-hack.securityContext.runAsUser | int | `1001` | | | initContainers.3-temp-hack.volumeMounts[0].mountPath | string | `"/opt/guacamole/postgresql-hack"` | | | initContainers.3-temp-hack.volumeMounts[0].name | string | `"temphack"` | | -| initContainers.4-temp-hack.args[0] | string | `"echo \"Copying postgres driver into the final destination.\"; cp -r /opt/guacamole/postgresql-hack/* /opt/guacamole/postgresql/; if [ -e /opt/guacamole/postgresql/postgresql-42.2.24.jre7.jar ];\n then echo \"Driver copied successfully!\";\n else echo \"Failed to copy the driver\";\nfi;\n"` | | +| initContainers.4-temp-hack.args[0] | string | `"echo \"Copying postgres driver into the final destination.\"; cp -r /opt/guacamole/postgresql-hack/* /opt/guacamole/postgresql/; if [ -e /opt/guacamole/postgresql/postgresql-42.2.24.jre7.jar ];\n then\n echo \"Driver copied successfully!\";\n else\n echo \"Failed to copy the driver\";\nfi;\n"` | | | initContainers.4-temp-hack.command[0] | string | `"/bin/sh"` | | | initContainers.4-temp-hack.command[1] | string | `"-c"` | | | initContainers.4-temp-hack.image | string | `"{{ .Values.image.repository }}:{{ .Values.image.tag }}"` | | @@ -89,7 +90,7 @@ You will, however, be able to use all values referenced in the common chart here | probes.startup.path | string | `"/guacamole"` | | | radius | object | `{}` | | | securityContext.readOnlyRootFilesystem | bool | `false` | | -| service.main.ports.main.port | int | `10080` | | +| service.main.ports.main.port | int | `9998` | | | service.main.ports.main.targetPort | int | `8080` | | | totp.TOTP_ENABLED | bool | `false` | | diff --git a/incubator/guacamole-client/0.0.1/ix_values.yaml b/incubator/guacamole-client/0.0.2/ix_values.yaml similarity index 81% rename from incubator/guacamole-client/0.0.1/ix_values.yaml rename to incubator/guacamole-client/0.0.2/ix_values.yaml index d236ea4ae11..dea66ef2f57 100644 --- a/incubator/guacamole-client/0.0.1/ix_values.yaml +++ b/incubator/guacamole-client/0.0.2/ix_values.yaml @@ -14,7 +14,7 @@ service: main: ports: main: - port: 10080 + port: 9998 targetPort: 8080 env: @@ -24,6 +24,10 @@ env: GUACD_HOSTNAME: "localhost" GUACD_PORT: 4822 +envFrom: + - configMapRef: + name: guacamole-client-env + totp: TOTP_ENABLED: false # TOTP_ISSUER: "Apache Guacamole" @@ -190,24 +194,36 @@ initContainers: for i in {1..10}; do pg_isready -t 5 -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT; if [ $? -eq 0 ]; - then echo "DB is ready!"; + then + echo "DB is ready!"; DBREADY=1; break; - else echo "DB not ready yet."; + else + echo "DB not ready yet."; fi; echo "Waiting..."; sleep 5; done; if [ $DBREADY -eq 1 ]; - then echo "Initializing DB's schema..."; - psql -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT -a -w -f /initdbdata/initdb.sql; - if [ $? -eq 0 ]; - then echo "DB's schema initialized successfully!"; - exit 0; - else echo "DB's schema failed to initialize."; - exit 1; - fi; - else echo "DB failed to start."; + then + psql -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT -q -c 'SELECT * FROM public.guacamole_user'; + if [ $? -eq 0 ]; + then + echo "DB already initialized. Skipping..."; + else + echo "Initializing DB's schema..."; + psql -h $POSTGRES_HOSTNAME -d $POSTGRES_DATABASE -U $POSTGRES_USER -p $POSTGRES_PORT -a -w -f /initdbdata/initdb.sql; + if [ $? -eq 0 ]; + then + echo "DB's schema initialized successfully!"; + exit 0; + else + echo "DB's schema failed to initialize."; + exit 1; + fi; + fi; + else + echo "DB failed to start."; fi; # Until they release an image with the updated driver, we need to manually replace it. @@ -227,24 +243,31 @@ initContainers: - > echo "Checing postgresql driver version..."; if [ -e /opt/guacamole/postgresql/postgresql-42.2.24.jre7.jar ]; - then echo "Version found is correct."; + then + echo "Version found is correct."; exit 0; - else echo "Old version found. Will try to download a known-to-work version."; + else + echo "Old version found. Will try to download a known-to-work version."; echo "Downloading (postgresql-42.2.24.jre7.jar)..."; curl -L "https://jdbc.postgresql.org/download/postgresql-42.2.24.jre7.jar" > "/opt/guacamole/postgresql-hack/postgresql-42.2.24.jre7.jar"; if [ -e /opt/guacamole/postgresql-hack/postgresql-42.2.24.jre7.jar ]; - then echo "Downloaded successfully!"; + then + echo "Downloaded successfully!"; cp -r /opt/guacamole/postgresql/* /opt/guacamole/postgresql-hack/; if [ -e /opt/guacamole/postgresql-hack/postgresql-9.4-1201.jdbc41.jar ]; - then echo "Removing old version... (postgresql-9.4-1201.jdbc41.jar)"; + then + echo "Removing old version... (postgresql-9.4-1201.jdbc41.jar)"; rm "/opt/guacamole/postgresql-hack/postgresql-9.4-1201.jdbc41.jar"; if [ $? -eq 0 ]; - then echo "Removed successfully!"; - else "Failed to remove."; + then + echo "Removed successfully!"; + else + echo "Failed to remove."; exit 1; fi; fi; - else echo "Failed to download."; + else + echo "Failed to download."; exit 1; fi; fi; @@ -264,6 +287,8 @@ initContainers: echo "Copying postgres driver into the final destination."; cp -r /opt/guacamole/postgresql-hack/* /opt/guacamole/postgresql/; if [ -e /opt/guacamole/postgresql/postgresql-42.2.24.jre7.jar ]; - then echo "Driver copied successfully!"; - else echo "Failed to copy the driver"; + then + echo "Driver copied successfully!"; + else + echo "Failed to copy the driver"; fi; diff --git a/incubator/guacamole-client/0.0.1/questions.yaml b/incubator/guacamole-client/0.0.2/questions.yaml similarity index 99% rename from incubator/guacamole-client/0.0.1/questions.yaml rename to incubator/guacamole-client/0.0.2/questions.yaml index 048b03da9dc..a85e180aa81 100644 --- a/incubator/guacamole-client/0.0.1/questions.yaml +++ b/incubator/guacamole-client/0.0.2/questions.yaml @@ -191,12 +191,14 @@ questions: description: "The hostname of the guacd instance to use to establish remote desktop connections" schema: type: string + required: true default: "" - variable: GUACD_PORT label: "Guacd Port" description: "The port that Guacamole should use when connecting to guacd." schema: type: int + required: true default: 4822 - variable: envList @@ -323,6 +325,11 @@ questions: schema: type: string default: "" + - variable: TOTP_PERIOD + label: "TOTP Period (Leave blank for default)" + schema: + type: string + default: "" - variable: TOTP_DIGITS label: "TOTP Digits" schema: @@ -337,11 +344,6 @@ questions: description: "7" - value: "8" description: "8" - - variable: TOTP_PERIOD - label: "TOTP Period (Leave blank for default)" - schema: - type: string - default: "" - variable: TOTP_MODE label: "TOTP Mode" schema: @@ -476,6 +478,16 @@ questions: schema: type: string default: "" + - variable: CAS_GROUP_LDAP_BASE_DN + label: "CAS Group LDAP Base DN" + schema: + type: string + default: "" + - variable: CAS_GROUP_LDAP_ATTRIBUTE + label: "CAS Group LDAP Attribute" + schema: + type: string + default: "" - variable: CAS_GROUP_FORMAT label: "CAS Group Format" schema: @@ -488,16 +500,6 @@ questions: description: "plain" - value: "ldap" description: "ldap" - - variable: CAS_GROUP_LDAP_BASE_DN - label: "CAS Group LDAP Base DN" - schema: - type: string - default: "" - - variable: CAS_GROUP_LDAP_ATTRIBUTE - label: "CAS Group LDAP Attribute" - schema: - type: string - default: "" - variable: openid group: "App Configuration" label: "OpenID Configuration" @@ -928,7 +930,7 @@ questions: description: "This port exposes the container port on the service" schema: type: int - default: 10080 + default: 9998 required: true - variable: advanced label: "Show Advanced settings" @@ -1828,13 +1830,13 @@ questions: description: "The UserID of the user running the application" schema: type: int - default: 568 + default: 1001 - variable: runAsGroup label: "runAsGroup" description: The groupID this App of the user running the application" schema: type: int - default: 568 + default: 1001 - variable: fsGroup label: "fsGroup" description: "The group that should own ALL storage." diff --git a/incubator/guacamole-client/0.0.1/security.md b/incubator/guacamole-client/0.0.2/security.md similarity index 99% rename from incubator/guacamole-client/0.0.1/security.md rename to incubator/guacamole-client/0.0.2/security.md index 2456d593c98..2316c262286 100644 --- a/incubator/guacamole-client/0.0.1/security.md +++ b/incubator/guacamole-client/0.0.2/security.md @@ -180,6 +180,8 @@ hide: | libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-bin | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| | libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| @@ -201,6 +203,8 @@ hide: | libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| | libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| @@ -222,6 +226,8 @@ hide: | libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| @@ -324,6 +330,8 @@ hide: | locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| locales | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| | login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| @@ -400,6 +408,8 @@ hide: | libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| | libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc-bin | CVE-2022-23218 | UNKNOWN | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | UNKNOWN | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 | |
Expand...
| | libc6 | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 | |
Expand...
| @@ -411,6 +421,8 @@ hide: | libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 | |
Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
| | libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | |
Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396
https://sourceware.org/bugzilla/show_bug.cgi?id=28524
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
| +| libc6 | CVE-2022-23218 | UNKNOWN | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | UNKNOWN | 2.31-13+deb11u2 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libcurl3-gnutls | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl3-gnutls | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl3-gnutls | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| @@ -620,6 +632,8 @@ hide: | libc-bin | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc-bin | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | libc-bin | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-bin | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-bin | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc-l10n | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc-l10n | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| | libc-l10n | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| @@ -641,6 +655,8 @@ hide: | libc-l10n | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc-l10n | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | libc-l10n | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc-l10n | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc-l10n | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libc6 | CVE-2021-33574 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
| | libc6 | CVE-2021-35942 | CRITICAL | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
| | libc6 | CVE-2020-1751 | HIGH | 2.28-10 | |
Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
https://linux.oracle.com/cve/CVE-2020-1751.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20200430-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25423
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
| @@ -662,6 +678,8 @@ hide: | libc6 | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | libc6 | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | libc6 | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| libc6 | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| libc6 | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | libcurl4 | CVE-2021-22946 | HIGH | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22947 | MEDIUM | 7.64.0-4+deb10u2 | |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22898 | LOW | 7.64.0-4+deb10u2 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com//security-alerts/cpujul2021.html
| @@ -764,6 +782,8 @@ hide: | locales | CVE-2019-9192 | LOW | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
| | locales | CVE-2020-6096 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
| | locales | CVE-2021-27645 | LOW | 2.28-10 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
| +| locales | CVE-2022-23218 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=28768
| +| locales | CVE-2022-23219 | UNKNOWN | 2.28-10 | |
Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=22542
| | login | CVE-2007-5686 | LOW | 1:4.5-1.1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| | login | CVE-2013-4235 | LOW | 1:4.5-1.1 | |
Expand...https://access.redhat.com/security/cve/cve-2013-4235
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2013-4235
| | login | CVE-2018-7169 | LOW | 1:4.5-1.1 | |
Expand...https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169
https://github.com/shadow-maint/shadow/pull/97
https://security.gentoo.org/glsa/201805-09
| diff --git a/incubator/guacamole-client/0.0.1/templates/_configmap.tpl b/incubator/guacamole-client/0.0.2/templates/_configmap.tpl similarity index 100% rename from incubator/guacamole-client/0.0.1/templates/_configmap.tpl rename to incubator/guacamole-client/0.0.2/templates/_configmap.tpl diff --git a/incubator/guacamole-client/0.0.1/templates/common.yaml b/incubator/guacamole-client/0.0.2/templates/common.yaml similarity index 100% rename from incubator/guacamole-client/0.0.1/templates/common.yaml rename to incubator/guacamole-client/0.0.2/templates/common.yaml diff --git a/incubator/guacamole-client/0.0.1/values.yaml b/incubator/guacamole-client/0.0.2/values.yaml similarity index 100% rename from incubator/guacamole-client/0.0.1/values.yaml rename to incubator/guacamole-client/0.0.2/values.yaml