diff --git a/stable/storj-node/1.0.1/Chart.lock b/stable/storj-node/1.0.1/Chart.lock
deleted file mode 100644
index eb93e02785f..00000000000
--- a/stable/storj-node/1.0.1/Chart.lock
+++ /dev/null
@@ -1,6 +0,0 @@
-dependencies:
-- name: common
- repository: https://truecharts.org
- version: 9.1.2
-digest: sha256:c31f80d9a593b307274ae84096234c1928a407d3899cf5b173eac54118901f24
-generated: "2022-03-15T15:19:39.232167744Z"
diff --git a/stable/storj-node/1.0.1/charts/common-9.1.2.tgz b/stable/storj-node/1.0.1/charts/common-9.1.2.tgz
deleted file mode 100644
index a1931401a3c..00000000000
Binary files a/stable/storj-node/1.0.1/charts/common-9.1.2.tgz and /dev/null differ
diff --git a/stable/storj-node/1.0.1/CHANGELOG.md b/stable/storj-node/1.0.3/CHANGELOG.md
similarity index 71%
rename from stable/storj-node/1.0.1/CHANGELOG.md
rename to stable/storj-node/1.0.3/CHANGELOG.md
index 545ce3c4847..a705147520f 100644
--- a/stable/storj-node/1.0.1/CHANGELOG.md
+++ b/stable/storj-node/1.0.3/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [storj-node-1.0.3](https://github.com/truecharts/apps/compare/storj-node-1.0.2...storj-node-1.0.3) (2022-03-16)
+
+#### Fix
+
+* run as root so migrations can complete ([#2187](https://github.com/truecharts/apps/issues/2187))
+
+
+
### [storj-node-1.0.1](https://github.com/truecharts/apps/compare/storj-node-1.0.0...storj-node-1.0.1) (2022-03-15)
diff --git a/stable/storj-node/1.0.1/CONFIG.md b/stable/storj-node/1.0.3/CONFIG.md
similarity index 100%
rename from stable/storj-node/1.0.1/CONFIG.md
rename to stable/storj-node/1.0.3/CONFIG.md
diff --git a/stable/storj-node/1.0.3/Chart.lock b/stable/storj-node/1.0.3/Chart.lock
new file mode 100644
index 00000000000..db188b08651
--- /dev/null
+++ b/stable/storj-node/1.0.3/Chart.lock
@@ -0,0 +1,6 @@
+dependencies:
+- name: common
+ repository: https://truecharts.org
+ version: 9.1.4
+digest: sha256:4266415271f61b205bd92aec35189a626fc572bf9c753bccc8a8aa18a8860a22
+generated: "2022-03-16T17:10:44.270998702Z"
diff --git a/stable/storj-node/1.0.1/Chart.yaml b/stable/storj-node/1.0.3/Chart.yaml
similarity index 96%
rename from stable/storj-node/1.0.1/Chart.yaml
rename to stable/storj-node/1.0.3/Chart.yaml
index 285b2735d7e..c438962b92d 100644
--- a/stable/storj-node/1.0.1/Chart.yaml
+++ b/stable/storj-node/1.0.3/Chart.yaml
@@ -3,7 +3,7 @@ appVersion: "1.50.2"
dependencies:
- name: common
repository: https://truecharts.org
- version: 9.1.2
+ version: 9.1.4
description: Storj is an S3-compatible platform and suite of decentralized applications that allows you to store data in a secure and decentralized manner
home: https://github.com/truecharts/apps/tree/master/charts/stable/storj-node
icon: https://truecharts.org/_static/img/appicons/storj-node.png
@@ -20,7 +20,7 @@ sources:
- https://github.com/storj/storj
- https://docs.storj.io/node/
- https://hub.docker.com/r/storjlabs/storagenode
-version: 1.0.1
+version: 1.0.3
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/storj-node/1.0.1/README.md b/stable/storj-node/1.0.3/README.md
similarity index 96%
rename from stable/storj-node/1.0.1/README.md
rename to stable/storj-node/1.0.3/README.md
index 3263087929b..e8c2eb0010e 100644
--- a/stable/storj-node/1.0.1/README.md
+++ b/stable/storj-node/1.0.3/README.md
@@ -19,7 +19,7 @@ Kubernetes: `>=1.16.0-0`
| Repository | Name | Version |
|------------|------|---------|
-| https://truecharts.org | common | 9.1.2 |
+| https://truecharts.org | common | 9.1.4 |
## Installing the Chart
diff --git a/stable/storj-node/1.0.1/SKIPINSTALL b/stable/storj-node/1.0.3/SKIPINSTALL
similarity index 100%
rename from stable/storj-node/1.0.1/SKIPINSTALL
rename to stable/storj-node/1.0.3/SKIPINSTALL
diff --git a/stable/storj-node/1.0.1/app-readme.md b/stable/storj-node/1.0.3/app-readme.md
similarity index 100%
rename from stable/storj-node/1.0.1/app-readme.md
rename to stable/storj-node/1.0.3/app-readme.md
diff --git a/stable/storj-node/1.0.3/charts/common-9.1.4.tgz b/stable/storj-node/1.0.3/charts/common-9.1.4.tgz
new file mode 100644
index 00000000000..ccce1bb2b86
Binary files /dev/null and b/stable/storj-node/1.0.3/charts/common-9.1.4.tgz differ
diff --git a/stable/storj-node/1.0.1/helm-values.md b/stable/storj-node/1.0.3/helm-values.md
similarity index 90%
rename from stable/storj-node/1.0.1/helm-values.md
rename to stable/storj-node/1.0.3/helm-values.md
index 13d6f4b9627..acabc0ebb0f 100644
--- a/stable/storj-node/1.0.1/helm-values.md
+++ b/stable/storj-node/1.0.3/helm-values.md
@@ -22,7 +22,11 @@ You will, however, be able to use all values referenced in the common chart here
| persistence.identity.mountPath | string | `"/app/identity"` | |
| persistence.storage.enabled | bool | `true` | |
| persistence.storage.mountPath | string | `"/app/config"` | |
+| podSecurityContext.runAsGroup | int | `0` | |
+| podSecurityContext.runAsUser | int | `0` | |
| secret.WALLET | string | `"walletaddress"` | |
+| securityContext.readOnlyRootFilesystem | bool | `false` | |
+| securityContext.runAsNonRoot | bool | `false` | |
| service.coretcp.enabled | bool | `true` | |
| service.coretcp.ports.coretcp.enabled | bool | `true` | |
| service.coretcp.ports.coretcp.port | int | `28967` | |
diff --git a/stable/storj-node/1.0.1/ix_values.yaml b/stable/storj-node/1.0.3/ix_values.yaml
similarity index 86%
rename from stable/storj-node/1.0.1/ix_values.yaml
rename to stable/storj-node/1.0.3/ix_values.yaml
index ca620539fec..89e31320d1d 100644
--- a/stable/storj-node/1.0.1/ix_values.yaml
+++ b/stable/storj-node/1.0.3/ix_values.yaml
@@ -3,9 +3,17 @@ image:
tag: v1.50.2@sha256:0e864b2acfeadf798a85bc2233b779be9bd69010cff005ab4911bb6eacb11c2e
pullPolicy: IfNotPresent
+securityContext:
+ runAsNonRoot: false
+ readOnlyRootFilesystem: false
+
+podSecurityContext:
+ runAsUser: 0
+ runAsGroup: 0
secret:
WALLET: "walletaddress"
+
env:
SETUP: true
EMAIL: ""
diff --git a/stable/storj-node/1.0.1/questions.yaml b/stable/storj-node/1.0.3/questions.yaml
similarity index 99%
rename from stable/storj-node/1.0.1/questions.yaml
rename to stable/storj-node/1.0.3/questions.yaml
index 645dbf9b6e0..bc5648db6c4 100644
--- a/stable/storj-node/1.0.1/questions.yaml
+++ b/stable/storj-node/1.0.3/questions.yaml
@@ -1901,7 +1901,7 @@ questions:
label: "ReadOnly Root Filesystem"
schema:
type: boolean
- default: true
+ default: false
- variable: allowPrivilegeEscalation
label: "Allow Privilege Escalation"
schema:
@@ -1911,7 +1911,7 @@ questions:
label: "runAsNonRoot"
schema:
type: boolean
- default: true
+ default: false
- variable: capabilities
label: "Capabilities"
schema:
@@ -1951,13 +1951,13 @@ questions:
description: "The UserID of the user running the application"
schema:
type: int
- default: 568
+ default: 0
- variable: runAsGroup
label: "runAsGroup"
description: The groupID this App of the user running the application"
schema:
type: int
- default: 568
+ default: 0
- variable: fsGroup
label: "fsGroup"
description: "The group that should own ALL storage."
diff --git a/stable/storj-node/1.0.1/security.md b/stable/storj-node/1.0.3/security.md
similarity index 87%
rename from stable/storj-node/1.0.1/security.md
rename to stable/storj-node/1.0.3/security.md
index cde2d8e492b..57da5d55638 100644
--- a/stable/storj-node/1.0.1/security.md
+++ b/stable/storj-node/1.0.3/security.md
@@ -21,8 +21,10 @@ hide:
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Expand...
The container should drop all default capabilities and add only those that are needed for its execution.
Container 'RELEASE-NAME-storj-node' of Deployment 'RELEASE-NAME-storj-node' should add 'ALL' to 'securityContext.capabilities.drop' | Expand...
https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
|
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Expand...
The container should drop all default capabilities and add only those that are needed for its execution.
Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should add 'ALL' to 'securityContext.capabilities.drop' | Expand...
https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
|
| Kubernetes Security Check | KSV011 | CPU not limited | LOW | Expand...
Enforcing CPU limits prevents DoS via resource exhaustion.
Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'resources.limits.cpu' | Expand...
https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
|
+| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'RELEASE-NAME-storj-node' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'autopermissions' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
+| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'RELEASE-NAME-storj-node' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'autopermissions' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW | Expand...
An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.
Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'securityContext.readOnlyRootFilesystem' to true | Expand...
https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
|
| Kubernetes Security Check | KSV015 | CPU requests not specified | LOW | Expand...
When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.
Container 'hostpatch' of Deployment 'RELEASE-NAME-storj-node' should set 'resources.requests.cpu' | Expand...
https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
|
@@ -68,6 +70,8 @@ hide:
| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
+| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
|
+| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
|
| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
@@ -100,6 +104,8 @@ hide:
| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
+| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
|
+| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r0 | 1.1.1n-r0 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
|
| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
@@ -119,8 +125,8 @@ hide:
**alpine**
-| No Vulnerabilities found |
-|:---------------------------------|
-
-
+| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
+|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
+| libcrypto1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r7 | 1.1.1n-r0 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
|
+| libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1l-r7 | 1.1.1n-r0 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
|
diff --git a/stable/storj-node/1.0.1/templates/common.yaml b/stable/storj-node/1.0.3/templates/common.yaml
similarity index 100%
rename from stable/storj-node/1.0.1/templates/common.yaml
rename to stable/storj-node/1.0.3/templates/common.yaml
diff --git a/stable/storj-node/1.0.1/values.yaml b/stable/storj-node/1.0.3/values.yaml
similarity index 100%
rename from stable/storj-node/1.0.1/values.yaml
rename to stable/storj-node/1.0.3/values.yaml