From f3fc111ba5620d176c5b29bf9cac6524730343a0 Mon Sep 17 00:00:00 2001 From: TrueCharts-Bot Date: Thu, 30 Jun 2022 09:01:14 +0000 Subject: [PATCH] Commit new App releases for TrueCharts Signed-off-by: TrueCharts-Bot --- .../promtail/{3.0.13 => 3.0.14}/CHANGELOG.md | 18 +++++------ .../promtail/{3.0.13 => 3.0.14}/CONFIG.md | 0 .../promtail/3.0.14}/Chart.lock | 2 +- .../promtail/{3.0.13 => 3.0.14}/Chart.yaml | 2 +- .../promtail/{3.0.13 => 3.0.14}/README.md | 0 .../promtail/{3.0.13 => 3.0.14}/app-readme.md | 0 .../charts/common-10.1.4.tgz | Bin .../{3.0.13 => 3.0.14}/helm-values.md | 0 .../{3.0.13 => 3.0.14}/ix_values.yaml | 0 .../{3.0.13 => 3.0.14}/questions.yaml | 0 .../promtail/{3.0.13 => 3.0.14}/security.md | 28 ++++++++++++++---- .../templates/_servicemonitor.tpl | 6 ++-- .../{3.0.13 => 3.0.14}/templates/common.yaml | 0 .../promtail/{3.0.13 => 3.0.14}/values.yaml | 0 .../grafana/{4.0.14 => 4.0.15}/CHANGELOG.md | 18 +++++------ stable/grafana/{4.0.14 => 4.0.15}/CONFIG.md | 0 .../grafana/4.0.15}/Chart.lock | 2 +- stable/grafana/{4.0.14 => 4.0.15}/Chart.yaml | 2 +- stable/grafana/{4.0.14 => 4.0.15}/README.md | 0 .../grafana/{4.0.14 => 4.0.15}/app-readme.md | 0 .../charts/common-10.1.4.tgz | Bin .../grafana/{4.0.14 => 4.0.15}/helm-values.md | 0 .../grafana/{4.0.14 => 4.0.15}/ix_values.yaml | 0 .../grafana/{4.0.14 => 4.0.15}/questions.yaml | 0 stable/grafana/{4.0.14 => 4.0.15}/security.md | 8 +++++ .../{4.0.14 => 4.0.15}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 6 ++-- .../templates/servicemonitor.yaml | 6 ++-- stable/grafana/{4.0.14 => 4.0.15}/values.yaml | 0 stable/loki/{5.0.8 => 5.0.9}/CHANGELOG.md | 18 +++++------ stable/loki/{5.0.8 => 5.0.9}/CONFIG.md | 0 stable/loki/{5.0.8 => 5.0.9}/Chart.lock | 2 +- stable/loki/{5.0.8 => 5.0.9}/Chart.yaml | 2 +- stable/loki/{5.0.8 => 5.0.9}/README.md | 0 stable/loki/{5.0.8 => 5.0.9}/app-readme.md | 0 .../{5.0.8 => 5.0.9}/charts/common-10.1.4.tgz | Bin .../charts/promtail-3.0.13.tgz | Bin stable/loki/{5.0.8 => 5.0.9}/helm-values.md | 0 stable/loki/{5.0.8 => 5.0.9}/ix_values.yaml | 2 +- stable/loki/{5.0.8 => 5.0.9}/questions.yaml | 0 stable/loki/{5.0.8 => 5.0.9}/security.md | 10 +++---- .../{5.0.8 => 5.0.9}/templates/_helpers.tpl | 0 .../{5.0.8 => 5.0.9}/templates/common.yaml | 0 stable/loki/{5.0.8 => 5.0.9}/values.yaml | 0 stable/promcord/{4.0.8 => 4.0.9}/CHANGELOG.md | 18 +++++------ stable/promcord/{4.0.8 => 4.0.9}/CONFIG.md | 0 .../3.0.8 => promcord/4.0.9}/Chart.lock | 2 +- stable/promcord/{4.0.8 => 4.0.9}/Chart.yaml | 2 +- stable/promcord/{4.0.8 => 4.0.9}/README.md | 0 .../promcord/{4.0.8 => 4.0.9}/app-readme.md | 0 .../{4.0.8 => 4.0.9}/charts/common-10.1.4.tgz | Bin .../{4.0.8 => 4.0.9}/ci/no-values.yaml | 0 .../promcord/{4.0.8 => 4.0.9}/helm-values.md | 0 .../promcord/{4.0.8 => 4.0.9}/ix_values.yaml | 0 .../promcord/{4.0.8 => 4.0.9}/questions.yaml | 0 stable/promcord/{4.0.8 => 4.0.9}/security.md | 10 +++---- .../{4.0.8 => 4.0.9}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 8 ++--- .../4.0.9}/templates/servicemonitor.yaml | 6 ++-- stable/promcord/{4.0.8 => 4.0.9}/values.yaml | 0 .../{3.0.8 => 3.0.9}/CHANGELOG.md | 18 +++++------ .../{3.0.8 => 3.0.9}/CONFIG.md | 0 .../3.0.9}/Chart.lock | 2 +- .../{3.0.8 => 3.0.9}/Chart.yaml | 2 +- .../{3.0.8 => 3.0.9}/README.md | 0 .../{3.0.8 => 3.0.9}/app-readme.md | 0 .../{3.0.8 => 3.0.9}/charts/common-10.1.4.tgz | Bin .../{3.0.8 => 3.0.9}/helm-values.md | 0 .../{3.0.8 => 3.0.9}/ix_values.yaml | 0 .../{3.0.8 => 3.0.9}/questions.yaml | 0 .../{3.0.8 => 3.0.9}/security.md | 0 .../{3.0.8 => 3.0.9}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 16 +++++----- .../3.0.9}/templates/servicemonitor.yaml | 6 ++-- .../{3.0.8 => 3.0.9}/values.yaml | 0 stable/unpoller/3.0.8/Chart.lock | 6 ---- stable/unpoller/{3.0.8 => 3.0.9}/CHANGELOG.md | 18 +++++------ stable/unpoller/{3.0.8 => 3.0.9}/CONFIG.md | 0 stable/unpoller/3.0.9/Chart.lock | 6 ++++ stable/unpoller/{3.0.8 => 3.0.9}/Chart.yaml | 2 +- stable/unpoller/{3.0.8 => 3.0.9}/README.md | 0 .../unpoller/{3.0.8 => 3.0.9}/app-readme.md | 0 .../{3.0.8 => 3.0.9}/charts/common-10.1.4.tgz | Bin .../unpoller/{3.0.8 => 3.0.9}/helm-values.md | 0 .../unpoller/{3.0.8 => 3.0.9}/ix_values.yaml | 0 .../unpoller/{3.0.8 => 3.0.9}/questions.yaml | 0 stable/unpoller/{3.0.8 => 3.0.9}/security.md | 0 .../{3.0.8 => 3.0.9}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 8 ++--- .../3.0.9}/templates/servicemonitor.yaml | 6 ++-- stable/unpoller/{3.0.8 => 3.0.9}/values.yaml | 0 .../uptimerobot-prometheus/4.0.8/Chart.lock | 6 ---- .../{4.0.8 => 4.0.9}/CHANGELOG.md | 18 +++++------ .../{4.0.8 => 4.0.9}/CONFIG.md | 0 .../uptimerobot-prometheus/4.0.9/Chart.lock | 6 ++++ .../{4.0.8 => 4.0.9}/Chart.yaml | 2 +- .../{4.0.8 => 4.0.9}/README.md | 0 .../{4.0.8 => 4.0.9}/app-readme.md | 0 .../{4.0.8 => 4.0.9}/charts/common-10.1.4.tgz | Bin .../{4.0.8 => 4.0.9}/helm-values.md | 0 .../{4.0.8 => 4.0.9}/ix_values.yaml | 0 .../{4.0.8 => 4.0.9}/questions.yaml | 0 .../{4.0.8 => 4.0.9}/security.md | 2 +- .../{4.0.8 => 4.0.9}/templates/common.yaml | 0 .../templates/prometheusrules.yaml | 8 ++--- .../4.0.9}/templates/servicemonitor.yaml | 6 ++-- .../{4.0.8 => 4.0.9}/values.yaml | 0 107 files changed, 170 insertions(+), 146 deletions(-) rename dependency/promtail/{3.0.13 => 3.0.14}/CHANGELOG.md (89%) rename dependency/promtail/{3.0.13 => 3.0.14}/CONFIG.md (100%) rename {stable/grafana/4.0.14 => dependency/promtail/3.0.14}/Chart.lock (80%) rename dependency/promtail/{3.0.13 => 3.0.14}/Chart.yaml (98%) rename dependency/promtail/{3.0.13 => 3.0.14}/README.md (100%) rename dependency/promtail/{3.0.13 => 3.0.14}/app-readme.md (100%) rename dependency/promtail/{3.0.13 => 3.0.14}/charts/common-10.1.4.tgz (100%) rename dependency/promtail/{3.0.13 => 3.0.14}/helm-values.md (100%) rename dependency/promtail/{3.0.13 => 3.0.14}/ix_values.yaml (100%) rename dependency/promtail/{3.0.13 => 3.0.14}/questions.yaml (100%) rename dependency/promtail/{3.0.13 => 3.0.14}/security.md (86%) rename dependency/promtail/{3.0.13 => 3.0.14}/templates/_servicemonitor.tpl (81%) rename dependency/promtail/{3.0.13 => 3.0.14}/templates/common.yaml (100%) rename dependency/promtail/{3.0.13 => 3.0.14}/values.yaml (100%) rename stable/grafana/{4.0.14 => 4.0.15}/CHANGELOG.md (90%) rename stable/grafana/{4.0.14 => 4.0.15}/CONFIG.md (100%) rename {dependency/promtail/3.0.13 => stable/grafana/4.0.15}/Chart.lock (80%) rename stable/grafana/{4.0.14 => 4.0.15}/Chart.yaml (98%) rename stable/grafana/{4.0.14 => 4.0.15}/README.md (100%) rename stable/grafana/{4.0.14 => 4.0.15}/app-readme.md (100%) rename stable/grafana/{4.0.14 => 4.0.15}/charts/common-10.1.4.tgz (100%) rename stable/grafana/{4.0.14 => 4.0.15}/helm-values.md (100%) rename stable/grafana/{4.0.14 => 4.0.15}/ix_values.yaml (100%) rename stable/grafana/{4.0.14 => 4.0.15}/questions.yaml (100%) rename stable/grafana/{4.0.14 => 4.0.15}/security.md (97%) rename stable/grafana/{4.0.14 => 4.0.15}/templates/common.yaml (100%) rename stable/grafana/{4.0.14 => 4.0.15}/templates/prometheusrules.yaml (72%) rename stable/grafana/{4.0.14 => 4.0.15}/templates/servicemonitor.yaml (75%) rename stable/grafana/{4.0.14 => 4.0.15}/values.yaml (100%) rename stable/loki/{5.0.8 => 5.0.9}/CHANGELOG.md (91%) rename stable/loki/{5.0.8 => 5.0.9}/CONFIG.md (100%) rename stable/loki/{5.0.8 => 5.0.9}/Chart.lock (85%) rename stable/loki/{5.0.8 => 5.0.9}/Chart.yaml (98%) rename stable/loki/{5.0.8 => 5.0.9}/README.md (100%) rename stable/loki/{5.0.8 => 5.0.9}/app-readme.md (100%) rename stable/loki/{5.0.8 => 5.0.9}/charts/common-10.1.4.tgz (100%) rename stable/loki/{5.0.8 => 5.0.9}/charts/promtail-3.0.13.tgz (100%) rename stable/loki/{5.0.8 => 5.0.9}/helm-values.md (100%) rename stable/loki/{5.0.8 => 5.0.9}/ix_values.yaml (98%) rename stable/loki/{5.0.8 => 5.0.9}/questions.yaml (100%) rename stable/loki/{5.0.8 => 5.0.9}/security.md (94%) rename stable/loki/{5.0.8 => 5.0.9}/templates/_helpers.tpl (100%) rename stable/loki/{5.0.8 => 5.0.9}/templates/common.yaml (100%) rename stable/loki/{5.0.8 => 5.0.9}/values.yaml (100%) rename stable/promcord/{4.0.8 => 4.0.9}/CHANGELOG.md (90%) rename stable/promcord/{4.0.8 => 4.0.9}/CONFIG.md (100%) rename stable/{speedtest-exporter/3.0.8 => promcord/4.0.9}/Chart.lock (80%) rename stable/promcord/{4.0.8 => 4.0.9}/Chart.yaml (97%) rename stable/promcord/{4.0.8 => 4.0.9}/README.md (100%) rename stable/promcord/{4.0.8 => 4.0.9}/app-readme.md (100%) rename stable/promcord/{4.0.8 => 4.0.9}/charts/common-10.1.4.tgz (100%) rename stable/promcord/{4.0.8 => 4.0.9}/ci/no-values.yaml (100%) rename stable/promcord/{4.0.8 => 4.0.9}/helm-values.md (100%) rename stable/promcord/{4.0.8 => 4.0.9}/ix_values.yaml (100%) rename stable/promcord/{4.0.8 => 4.0.9}/questions.yaml (100%) rename stable/promcord/{4.0.8 => 4.0.9}/security.md (96%) rename stable/promcord/{4.0.8 => 4.0.9}/templates/common.yaml (100%) rename stable/promcord/{4.0.8 => 4.0.9}/templates/prometheusrules.yaml (73%) rename stable/{unpoller/3.0.8 => promcord/4.0.9}/templates/servicemonitor.yaml (75%) rename stable/promcord/{4.0.8 => 4.0.9}/values.yaml (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/CHANGELOG.md (90%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/CONFIG.md (100%) rename stable/{promcord/4.0.8 => speedtest-exporter/3.0.9}/Chart.lock (80%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/Chart.yaml (98%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/README.md (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/app-readme.md (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/charts/common-10.1.4.tgz (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/helm-values.md (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/ix_values.yaml (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/questions.yaml (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/security.md (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/templates/common.yaml (100%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/templates/prometheusrules.yaml (84%) rename stable/{uptimerobot-prometheus/4.0.8 => speedtest-exporter/3.0.9}/templates/servicemonitor.yaml (75%) rename stable/speedtest-exporter/{3.0.8 => 3.0.9}/values.yaml (100%) delete mode 100644 stable/unpoller/3.0.8/Chart.lock rename stable/unpoller/{3.0.8 => 3.0.9}/CHANGELOG.md (90%) rename stable/unpoller/{3.0.8 => 3.0.9}/CONFIG.md (100%) create mode 100644 stable/unpoller/3.0.9/Chart.lock rename stable/unpoller/{3.0.8 => 3.0.9}/Chart.yaml (98%) rename stable/unpoller/{3.0.8 => 3.0.9}/README.md (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/app-readme.md (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/charts/common-10.1.4.tgz (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/helm-values.md (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/ix_values.yaml (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/questions.yaml (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/security.md (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/templates/common.yaml (100%) rename stable/unpoller/{3.0.8 => 3.0.9}/templates/prometheusrules.yaml (73%) rename stable/{speedtest-exporter/3.0.8 => unpoller/3.0.9}/templates/servicemonitor.yaml (75%) rename stable/unpoller/{3.0.8 => 3.0.9}/values.yaml (100%) delete mode 100644 stable/uptimerobot-prometheus/4.0.8/Chart.lock rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/CHANGELOG.md (90%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/CONFIG.md (100%) create mode 100644 stable/uptimerobot-prometheus/4.0.9/Chart.lock rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/Chart.yaml (98%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/README.md (100%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/app-readme.md (100%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/charts/common-10.1.4.tgz (100%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/helm-values.md (100%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/ix_values.yaml (100%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/questions.yaml (100%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/security.md (99%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/templates/common.yaml (100%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/templates/prometheusrules.yaml (74%) rename stable/{promcord/4.0.8 => uptimerobot-prometheus/4.0.9}/templates/servicemonitor.yaml (75%) rename stable/uptimerobot-prometheus/{4.0.8 => 4.0.9}/values.yaml (100%) diff --git a/dependency/promtail/3.0.13/CHANGELOG.md b/dependency/promtail/3.0.14/CHANGELOG.md similarity index 89% rename from dependency/promtail/3.0.13/CHANGELOG.md rename to dependency/promtail/3.0.14/CHANGELOG.md index 953432101f4..1897f18f455 100644 --- a/dependency/promtail/3.0.13/CHANGELOG.md +++ b/dependency/promtail/3.0.14/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [promtail-3.0.14](https://github.com/truecharts/apps/compare/promtail-3.0.13...promtail-3.0.14) (2022-06-30) + +#### Fix + +* change some common references to tc.common ([#3019](https://github.com/truecharts/apps/issues/3019)) + + + ### [promtail-3.0.13](https://github.com/truecharts/apps/compare/promtail-3.0.12...promtail-3.0.13) (2022-06-25) @@ -88,12 +97,3 @@ ### [promtail-3.0.4](https://github.com/truecharts/apps/compare/promtail-3.0.3...promtail-3.0.4) (2022-06-14) - -#### Chore - -* update helm chart common to v10.0.10 ([#2885](https://github.com/truecharts/apps/issues/2885)) - - - - -### [promtail-3.0.3](https://github.com/truecharts/apps/compare/promtail-3.0.2...promtail-3.0.3) (2022-06-11) diff --git a/dependency/promtail/3.0.13/CONFIG.md b/dependency/promtail/3.0.14/CONFIG.md similarity index 100% rename from dependency/promtail/3.0.13/CONFIG.md rename to dependency/promtail/3.0.14/CONFIG.md diff --git a/stable/grafana/4.0.14/Chart.lock b/dependency/promtail/3.0.14/Chart.lock similarity index 80% rename from stable/grafana/4.0.14/Chart.lock rename to dependency/promtail/3.0.14/Chart.lock index 18e81f662e4..24fb330c7c9 100644 --- a/stable/grafana/4.0.14/Chart.lock +++ b/dependency/promtail/3.0.14/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.1.4 digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 -generated: "2022-06-27T16:20:37.43114948Z" +generated: "2022-06-30T08:50:54.463777211Z" diff --git a/dependency/promtail/3.0.13/Chart.yaml b/dependency/promtail/3.0.14/Chart.yaml similarity index 98% rename from dependency/promtail/3.0.13/Chart.yaml rename to dependency/promtail/3.0.14/Chart.yaml index 10b85805c1c..822f04ea5e9 100644 --- a/dependency/promtail/3.0.13/Chart.yaml +++ b/dependency/promtail/3.0.14/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://grafana.com/oss/loki/ - https://grafana.com/docs/loki/latest/ type: application -version: 3.0.13 +version: 3.0.14 annotations: truecharts.org/catagories: | - metrics diff --git a/dependency/promtail/3.0.13/README.md b/dependency/promtail/3.0.14/README.md similarity index 100% rename from dependency/promtail/3.0.13/README.md rename to dependency/promtail/3.0.14/README.md diff --git a/dependency/promtail/3.0.13/app-readme.md b/dependency/promtail/3.0.14/app-readme.md similarity index 100% rename from dependency/promtail/3.0.13/app-readme.md rename to dependency/promtail/3.0.14/app-readme.md diff --git a/dependency/promtail/3.0.13/charts/common-10.1.4.tgz b/dependency/promtail/3.0.14/charts/common-10.1.4.tgz similarity index 100% rename from dependency/promtail/3.0.13/charts/common-10.1.4.tgz rename to dependency/promtail/3.0.14/charts/common-10.1.4.tgz diff --git a/dependency/promtail/3.0.13/helm-values.md b/dependency/promtail/3.0.14/helm-values.md similarity index 100% rename from dependency/promtail/3.0.13/helm-values.md rename to dependency/promtail/3.0.14/helm-values.md diff --git a/dependency/promtail/3.0.13/ix_values.yaml b/dependency/promtail/3.0.14/ix_values.yaml similarity index 100% rename from dependency/promtail/3.0.13/ix_values.yaml rename to dependency/promtail/3.0.14/ix_values.yaml diff --git a/dependency/promtail/3.0.13/questions.yaml b/dependency/promtail/3.0.14/questions.yaml similarity index 100% rename from dependency/promtail/3.0.13/questions.yaml rename to dependency/promtail/3.0.14/questions.yaml diff --git a/dependency/promtail/3.0.13/security.md b/dependency/promtail/3.0.14/security.md similarity index 86% rename from dependency/promtail/3.0.13/security.md rename to dependency/promtail/3.0.14/security.md index 1fd1fa58d91..9e01c12462e 100644 --- a/dependency/promtail/3.0.13/security.md +++ b/dependency/promtail/3.0.14/security.md @@ -17,7 +17,23 @@ hide: | Type | Misconfiguration ID | Check | Severity | Explaination | Links | |:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| -| Rbac Security Check | KSV047 | Do not allow privilege escalation from node proxy | HIGH |
Expand... Check whether role permits privilege escalation from node proxy


Role permits privilege escalation from node proxy
|
Expand...https://kubernetes.io/docs/concepts/security/rbac-good-practices/
https://avd.aquasec.com/misconfig/ksv047
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'RELEASE-NAME-promtail' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv001
| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'autopermissions' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv001
| +| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'autopermissions' of Deployment 'RELEASE-NAME-promtail' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/misconfig/ksv003
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-promtail' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv012
| +| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv012
| +| Kubernetes Security Check | KSV014 | Root file system is not read-only | LOW |
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.readOnlyRootFilesystem' to true
|
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/misconfig/ksv014
| +| Kubernetes Security Check | KSV017 | Privileged container | HIGH |
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.privileged' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/misconfig/ksv017
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-promtail' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv020
| +| Kubernetes Security Check | KSV020 | Runs with low user ID | LOW |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv020
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-promtail' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv021
| +| Kubernetes Security Check | KSV021 | Runs with low group ID | LOW |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-promtail' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/misconfig/ksv021
| +| Kubernetes Security Check | KSV023 | hostPath volumes mounted | MEDIUM |
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-promtail' should not set 'spec.template.volumes.hostPath'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/misconfig/ksv023
| +| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW |
Expand... The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles.


Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv030
| +| Kubernetes Security Check | KSV030 | Default Seccomp profile not set | LOW |
Expand... The RuntimeDefault/Localhost seccomp profile must be required, or allow specific additional profiles.


Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault'
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv030
| +| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW |
Expand... Containers should be forbidden from running with a root UID.


securityContext.runAsUser should be set to a value greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv105
| +| Kubernetes Security Check | KSV105 | Containers must not set runAsUser to 0 | LOW |
Expand... Containers should be forbidden from running with a root UID.


securityContext.runAsUser should be set to a value greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv105
| +| Kubernetes Security Check | KSV106 | Container capabilities must only include NET_BIND_SERVICE | LOW |
Expand... Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability.


container should drop all
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/misconfig/ksv106
| ## Containers @@ -104,8 +120,8 @@ hide: | libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| | libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| | libss2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| -| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
| +| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libssl1.1 | CVE-2022-2068 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
| | libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd-dev | CVE-2013-4392 | LOW | 250.4-1~bpo11+1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| @@ -126,8 +142,8 @@ hide: | ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| -| openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| -| openssl | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
| +| openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl | CVE-2022-2068 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -137,7 +153,7 @@ hide: | perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| | tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| | util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| +| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| **gobinary** diff --git a/dependency/promtail/3.0.13/templates/_servicemonitor.tpl b/dependency/promtail/3.0.14/templates/_servicemonitor.tpl similarity index 81% rename from dependency/promtail/3.0.13/templates/_servicemonitor.tpl rename to dependency/promtail/3.0.14/templates/_servicemonitor.tpl index 2daee565e15..cda54130742 100644 --- a/dependency/promtail/3.0.13/templates/_servicemonitor.tpl +++ b/dependency/promtail/3.0.14/templates/_servicemonitor.tpl @@ -4,13 +4,13 @@ apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: - name: {{ include "common.names.fullname" . -}} + name: {{ include "tc.common.names.fullname" . -}} {{- with .Values.serviceMonitor.annotations }} annotations: {{- toYaml . | nindent 4 }} {{- end }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.serviceMonitor.labels }} {{- toYaml . | nindent 4 }} {{- end }} @@ -21,7 +21,7 @@ spec: {{- end }} selector: matchLabels: - {{- include "common.labels.selectorLabels" . | nindent 6 }} + {{- include "tc.common.labels.selectorLabels" . | nindent 6 }} endpoints: - port: http-metrics {{- with .Values.serviceMonitor.interval }} diff --git a/dependency/promtail/3.0.13/templates/common.yaml b/dependency/promtail/3.0.14/templates/common.yaml similarity index 100% rename from dependency/promtail/3.0.13/templates/common.yaml rename to dependency/promtail/3.0.14/templates/common.yaml diff --git a/dependency/promtail/3.0.13/values.yaml b/dependency/promtail/3.0.14/values.yaml similarity index 100% rename from dependency/promtail/3.0.13/values.yaml rename to dependency/promtail/3.0.14/values.yaml diff --git a/stable/grafana/4.0.14/CHANGELOG.md b/stable/grafana/4.0.15/CHANGELOG.md similarity index 90% rename from stable/grafana/4.0.14/CHANGELOG.md rename to stable/grafana/4.0.15/CHANGELOG.md index 9808ce34aea..8d352139966 100644 --- a/stable/grafana/4.0.14/CHANGELOG.md +++ b/stable/grafana/4.0.15/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grafana-4.0.15](https://github.com/truecharts/apps/compare/grafana-4.0.14...grafana-4.0.15) (2022-06-30) + +#### Fix + +* change some common references to tc.common ([#3019](https://github.com/truecharts/apps/issues/3019)) + + + ### [grafana-4.0.14](https://github.com/truecharts/apps/compare/grafana-4.0.13...grafana-4.0.14) (2022-06-27) @@ -88,12 +97,3 @@ #### Chore -* update helm general non-major helm releases ([#2854](https://github.com/truecharts/apps/issues/2854)) - - - - -### [grafana-4.0.4](https://github.com/truecharts/apps/compare/grafana-4.0.3...grafana-4.0.4) (2022-06-11) - -#### Chore - diff --git a/stable/grafana/4.0.14/CONFIG.md b/stable/grafana/4.0.15/CONFIG.md similarity index 100% rename from stable/grafana/4.0.14/CONFIG.md rename to stable/grafana/4.0.15/CONFIG.md diff --git a/dependency/promtail/3.0.13/Chart.lock b/stable/grafana/4.0.15/Chart.lock similarity index 80% rename from dependency/promtail/3.0.13/Chart.lock rename to stable/grafana/4.0.15/Chart.lock index 34302285264..038cef36fda 100644 --- a/dependency/promtail/3.0.13/Chart.lock +++ b/stable/grafana/4.0.15/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.1.4 digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 -generated: "2022-06-25T06:41:33.012190316Z" +generated: "2022-06-30T08:50:54.428388794Z" diff --git a/stable/grafana/4.0.14/Chart.yaml b/stable/grafana/4.0.15/Chart.yaml similarity index 98% rename from stable/grafana/4.0.14/Chart.yaml rename to stable/grafana/4.0.15/Chart.yaml index 3f6f234dc17..0e99d18c518 100644 --- a/stable/grafana/4.0.14/Chart.yaml +++ b/stable/grafana/4.0.15/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/bitnami/bitnami-docker-grafana - https://grafana.com/ type: application -version: 4.0.14 +version: 4.0.15 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/grafana/4.0.14/README.md b/stable/grafana/4.0.15/README.md similarity index 100% rename from stable/grafana/4.0.14/README.md rename to stable/grafana/4.0.15/README.md diff --git a/stable/grafana/4.0.14/app-readme.md b/stable/grafana/4.0.15/app-readme.md similarity index 100% rename from stable/grafana/4.0.14/app-readme.md rename to stable/grafana/4.0.15/app-readme.md diff --git a/stable/grafana/4.0.14/charts/common-10.1.4.tgz b/stable/grafana/4.0.15/charts/common-10.1.4.tgz similarity index 100% rename from stable/grafana/4.0.14/charts/common-10.1.4.tgz rename to stable/grafana/4.0.15/charts/common-10.1.4.tgz diff --git a/stable/grafana/4.0.14/helm-values.md b/stable/grafana/4.0.15/helm-values.md similarity index 100% rename from stable/grafana/4.0.14/helm-values.md rename to stable/grafana/4.0.15/helm-values.md diff --git a/stable/grafana/4.0.14/ix_values.yaml b/stable/grafana/4.0.15/ix_values.yaml similarity index 100% rename from stable/grafana/4.0.14/ix_values.yaml rename to stable/grafana/4.0.15/ix_values.yaml diff --git a/stable/grafana/4.0.14/questions.yaml b/stable/grafana/4.0.15/questions.yaml similarity index 100% rename from stable/grafana/4.0.14/questions.yaml rename to stable/grafana/4.0.15/questions.yaml diff --git a/stable/grafana/4.0.14/security.md b/stable/grafana/4.0.15/security.md similarity index 97% rename from stable/grafana/4.0.14/security.md rename to stable/grafana/4.0.15/security.md index beadf545472..839053d8634 100644 --- a/stable/grafana/4.0.14/security.md +++ b/stable/grafana/4.0.15/security.md @@ -78,6 +78,10 @@ hide: | curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://nvd.nist.gov/vuln/detail/CVE-2022-27774
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | curl | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://nvd.nist.gov/vuln/detail/CVE-2022-27776
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| curl | CVE-2022-32205 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32205
https://curl.se/docs/CVE-2022-32205.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
https://ubuntu.com/security/notices/USN-5495-1
| +| curl | CVE-2022-32206 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32206
https://curl.se/docs/CVE-2022-32206.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
https://ubuntu.com/security/notices/USN-5495-1
| +| curl | CVE-2022-32207 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32207
https://curl.se/docs/CVE-2022-32207.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
https://ubuntu.com/security/notices/USN-5495-1
| +| curl | CVE-2022-32208 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32208
https://curl.se/docs/CVE-2022-32208.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
https://ubuntu.com/security/notices/USN-5495-1
| | curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| @@ -110,6 +114,10 @@ hide: | libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2022-27774 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://hackerone.com/reports/1543773
https://nvd.nist.gov/vuln/detail/CVE-2022-27774
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| | libcurl4 | CVE-2022-27776 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://hackerone.com/reports/1547048
https://nvd.nist.gov/vuln/detail/CVE-2022-27776
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
| +| libcurl4 | CVE-2022-32205 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32205
https://curl.se/docs/CVE-2022-32205.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
https://ubuntu.com/security/notices/USN-5495-1
| +| libcurl4 | CVE-2022-32206 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32206
https://curl.se/docs/CVE-2022-32206.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
https://ubuntu.com/security/notices/USN-5495-1
| +| libcurl4 | CVE-2022-32207 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32207
https://curl.se/docs/CVE-2022-32207.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
https://ubuntu.com/security/notices/USN-5495-1
| +| libcurl4 | CVE-2022-32208 | MEDIUM | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-32208
https://curl.se/docs/CVE-2022-32208.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
https://ubuntu.com/security/notices/USN-5495-1
| | libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
| | libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22922
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22922.html
https://hackerone.com/reports/1213175
https://linux.oracle.com/cve/CVE-2021-22922.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22922
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| | libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-22923
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22923.html
https://hackerone.com/reports/1213181
https://linux.oracle.com/cve/CVE-2021-22923.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22923
https://security.netapp.com/advisory/ntap-20210902-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
| diff --git a/stable/grafana/4.0.14/templates/common.yaml b/stable/grafana/4.0.15/templates/common.yaml similarity index 100% rename from stable/grafana/4.0.14/templates/common.yaml rename to stable/grafana/4.0.15/templates/common.yaml diff --git a/stable/grafana/4.0.14/templates/prometheusrules.yaml b/stable/grafana/4.0.15/templates/prometheusrules.yaml similarity index 72% rename from stable/grafana/4.0.14/templates/prometheusrules.yaml rename to stable/grafana/4.0.15/templates/prometheusrules.yaml index ae2e511cac2..35b77edf0f6 100644 --- a/stable/grafana/4.0.14/templates/prometheusrules.yaml +++ b/stable/grafana/4.0.15/templates/prometheusrules.yaml @@ -2,15 +2,15 @@ apiVersion: monitoring.coreos.com/v1 kind: PrometheusRule metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.prometheusRule.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: groups: - - name: {{ include "common.names.fullname" . }} + - name: {{ include "tc.common.names.fullname" . }} rules: {{- with .Values.metrics.prometheusRule.rules }} {{- toYaml . | nindent 8 }} diff --git a/stable/grafana/4.0.14/templates/servicemonitor.yaml b/stable/grafana/4.0.15/templates/servicemonitor.yaml similarity index 75% rename from stable/grafana/4.0.14/templates/servicemonitor.yaml rename to stable/grafana/4.0.15/templates/servicemonitor.yaml index 3edd7fd70b1..cec4d368093 100644 --- a/stable/grafana/4.0.14/templates/servicemonitor.yaml +++ b/stable/grafana/4.0.15/templates/servicemonitor.yaml @@ -2,16 +2,16 @@ apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.serviceMonitor.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: selector: matchLabels: - {{- include "common.labels.selectorLabels" . | nindent 6 }} + {{- include "tc.common.labels.selectorLabels" . | nindent 6 }} endpoints: - port: main {{- with .Values.metrics.serviceMonitor.interval }} diff --git a/stable/grafana/4.0.14/values.yaml b/stable/grafana/4.0.15/values.yaml similarity index 100% rename from stable/grafana/4.0.14/values.yaml rename to stable/grafana/4.0.15/values.yaml diff --git a/stable/loki/5.0.8/CHANGELOG.md b/stable/loki/5.0.9/CHANGELOG.md similarity index 91% rename from stable/loki/5.0.8/CHANGELOG.md rename to stable/loki/5.0.9/CHANGELOG.md index db937760ff0..06c4caa8896 100644 --- a/stable/loki/5.0.8/CHANGELOG.md +++ b/stable/loki/5.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [loki-5.0.9](https://github.com/truecharts/apps/compare/loki-5.0.8...loki-5.0.9) (2022-06-30) + +#### Fix + +* change some common references to tc.common ([#3019](https://github.com/truecharts/apps/issues/3019)) + + + ### [loki-5.0.8](https://github.com/truecharts/apps/compare/loki-5.0.7...loki-5.0.8) (2022-06-25) @@ -88,12 +97,3 @@ ### [loki-4.0.1](https://github.com/truecharts/apps/compare/loki-3.0.22...loki-4.0.1) (2022-06-07) - -#### Chore - -* Auto-update chart README [skip ci] -* sync all apps persistence configuration and always default to PVC -* update helm general non-major helm releases ([#2838](https://github.com/truecharts/apps/issues/2838)) - -#### Fix - diff --git a/stable/loki/5.0.8/CONFIG.md b/stable/loki/5.0.9/CONFIG.md similarity index 100% rename from stable/loki/5.0.8/CONFIG.md rename to stable/loki/5.0.9/CONFIG.md diff --git a/stable/loki/5.0.8/Chart.lock b/stable/loki/5.0.9/Chart.lock similarity index 85% rename from stable/loki/5.0.8/Chart.lock rename to stable/loki/5.0.9/Chart.lock index 569df9f9711..68c5aef0dd3 100644 --- a/stable/loki/5.0.8/Chart.lock +++ b/stable/loki/5.0.9/Chart.lock @@ -6,4 +6,4 @@ dependencies: repository: https://charts.truecharts.org version: 3.0.13 digest: sha256:4617ea6188980238a2ca8c101a8c7a735157e57fa214ec9691fbd837c2bdd421 -generated: "2022-06-25T13:50:22.732411696Z" +generated: "2022-06-30T08:51:00.106603319Z" diff --git a/stable/loki/5.0.8/Chart.yaml b/stable/loki/5.0.9/Chart.yaml similarity index 98% rename from stable/loki/5.0.8/Chart.yaml rename to stable/loki/5.0.9/Chart.yaml index dbd715a43e8..cc6bad797f7 100644 --- a/stable/loki/5.0.8/Chart.yaml +++ b/stable/loki/5.0.9/Chart.yaml @@ -23,7 +23,7 @@ name: loki sources: - https://github.com/grafana/loki type: application -version: 5.0.8 +version: 5.0.9 annotations: truecharts.org/catagories: | - logs diff --git a/stable/loki/5.0.8/README.md b/stable/loki/5.0.9/README.md similarity index 100% rename from stable/loki/5.0.8/README.md rename to stable/loki/5.0.9/README.md diff --git a/stable/loki/5.0.8/app-readme.md b/stable/loki/5.0.9/app-readme.md similarity index 100% rename from stable/loki/5.0.8/app-readme.md rename to stable/loki/5.0.9/app-readme.md diff --git a/stable/loki/5.0.8/charts/common-10.1.4.tgz b/stable/loki/5.0.9/charts/common-10.1.4.tgz similarity index 100% rename from stable/loki/5.0.8/charts/common-10.1.4.tgz rename to stable/loki/5.0.9/charts/common-10.1.4.tgz diff --git a/stable/loki/5.0.8/charts/promtail-3.0.13.tgz b/stable/loki/5.0.9/charts/promtail-3.0.13.tgz similarity index 100% rename from stable/loki/5.0.8/charts/promtail-3.0.13.tgz rename to stable/loki/5.0.9/charts/promtail-3.0.13.tgz diff --git a/stable/loki/5.0.8/helm-values.md b/stable/loki/5.0.9/helm-values.md similarity index 100% rename from stable/loki/5.0.8/helm-values.md rename to stable/loki/5.0.9/helm-values.md diff --git a/stable/loki/5.0.8/ix_values.yaml b/stable/loki/5.0.9/ix_values.yaml similarity index 98% rename from stable/loki/5.0.8/ix_values.yaml rename to stable/loki/5.0.9/ix_values.yaml index 3fb99ed0fab..50fd4052c88 100644 --- a/stable/loki/5.0.8/ix_values.yaml +++ b/stable/loki/5.0.9/ix_values.yaml @@ -32,7 +32,7 @@ args: # alerting: # enabled: true # data: -# '{{ include "common.names.fullname" . }}-alerting-rules.yaml': |- +# '{{ include "tc.common.names.fullname" . }}-alerting-rules.yaml': |- # {{- if gt (len .Values.alerting_groups) 0 }} # groups: # {{- toYaml .Values.alerting_groups | nindent 6 }} diff --git a/stable/loki/5.0.8/questions.yaml b/stable/loki/5.0.9/questions.yaml similarity index 100% rename from stable/loki/5.0.8/questions.yaml rename to stable/loki/5.0.9/questions.yaml diff --git a/stable/loki/5.0.8/security.md b/stable/loki/5.0.9/security.md similarity index 94% rename from stable/loki/5.0.8/security.md rename to stable/loki/5.0.9/security.md index 87689bf822d..a4c84d5dcd2 100644 --- a/stable/loki/5.0.8/security.md +++ b/stable/loki/5.0.9/security.md @@ -159,8 +159,8 @@ hide: | libsepol1 | CVE-2021-36087 | LOW | 3.1-1 | |
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
https://ubuntu.com/security/notices/USN-5391-1
| | libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| | libss2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| -| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
| +| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libssl1.1 | CVE-2022-2068 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
| | libssl1.1 | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd-dev | CVE-2013-4392 | LOW | 250.4-1~bpo11+1 | |
Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
| @@ -181,8 +181,8 @@ hide: | ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| -| openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| -| openssl | CVE-2022-2068 | MEDIUM | 1.1.1n-0+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
| +| openssl | CVE-2022-1292 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl | CVE-2022-2068 | CRITICAL | 1.1.1n-0+deb11u1 | 1.1.1n-0+deb11u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
| | openssl | CVE-2007-6755 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1n-0+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -192,7 +192,7 @@ hide: | perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | |
Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
| | tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | |
Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
| | util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| +| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| **gobinary** diff --git a/stable/loki/5.0.8/templates/_helpers.tpl b/stable/loki/5.0.9/templates/_helpers.tpl similarity index 100% rename from stable/loki/5.0.8/templates/_helpers.tpl rename to stable/loki/5.0.9/templates/_helpers.tpl diff --git a/stable/loki/5.0.8/templates/common.yaml b/stable/loki/5.0.9/templates/common.yaml similarity index 100% rename from stable/loki/5.0.8/templates/common.yaml rename to stable/loki/5.0.9/templates/common.yaml diff --git a/stable/loki/5.0.8/values.yaml b/stable/loki/5.0.9/values.yaml similarity index 100% rename from stable/loki/5.0.8/values.yaml rename to stable/loki/5.0.9/values.yaml diff --git a/stable/promcord/4.0.8/CHANGELOG.md b/stable/promcord/4.0.9/CHANGELOG.md similarity index 90% rename from stable/promcord/4.0.8/CHANGELOG.md rename to stable/promcord/4.0.9/CHANGELOG.md index b2b1012c5f8..f3f6018722e 100644 --- a/stable/promcord/4.0.8/CHANGELOG.md +++ b/stable/promcord/4.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [promcord-4.0.9](https://github.com/truecharts/apps/compare/promcord-4.0.8...promcord-4.0.9) (2022-06-30) + +#### Fix + +* change some common references to tc.common ([#3019](https://github.com/truecharts/apps/issues/3019)) + + + ### [promcord-4.0.8](https://github.com/truecharts/apps/compare/promcord-4.0.7...promcord-4.0.8) (2022-06-25) @@ -88,12 +97,3 @@ #### Refactor * BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - - - -### [promcord-3.0.20](https://github.com/truecharts/apps/compare/promcord-3.0.19...promcord-3.0.20) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) diff --git a/stable/promcord/4.0.8/CONFIG.md b/stable/promcord/4.0.9/CONFIG.md similarity index 100% rename from stable/promcord/4.0.8/CONFIG.md rename to stable/promcord/4.0.9/CONFIG.md diff --git a/stable/speedtest-exporter/3.0.8/Chart.lock b/stable/promcord/4.0.9/Chart.lock similarity index 80% rename from stable/speedtest-exporter/3.0.8/Chart.lock rename to stable/promcord/4.0.9/Chart.lock index b2f03268a21..267fdaddb98 100644 --- a/stable/speedtest-exporter/3.0.8/Chart.lock +++ b/stable/promcord/4.0.9/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.1.4 digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 -generated: "2022-06-25T14:31:58.225021809Z" +generated: "2022-06-30T08:50:54.466191048Z" diff --git a/stable/promcord/4.0.8/Chart.yaml b/stable/promcord/4.0.9/Chart.yaml similarity index 97% rename from stable/promcord/4.0.8/Chart.yaml rename to stable/promcord/4.0.9/Chart.yaml index ad802b9c368..e1da3f597ca 100644 --- a/stable/promcord/4.0.8/Chart.yaml +++ b/stable/promcord/4.0.9/Chart.yaml @@ -21,7 +21,7 @@ name: promcord sources: - https://github.com/nimarion/promcord type: application -version: 4.0.8 +version: 4.0.9 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/promcord/4.0.8/README.md b/stable/promcord/4.0.9/README.md similarity index 100% rename from stable/promcord/4.0.8/README.md rename to stable/promcord/4.0.9/README.md diff --git a/stable/promcord/4.0.8/app-readme.md b/stable/promcord/4.0.9/app-readme.md similarity index 100% rename from stable/promcord/4.0.8/app-readme.md rename to stable/promcord/4.0.9/app-readme.md diff --git a/stable/promcord/4.0.8/charts/common-10.1.4.tgz b/stable/promcord/4.0.9/charts/common-10.1.4.tgz similarity index 100% rename from stable/promcord/4.0.8/charts/common-10.1.4.tgz rename to stable/promcord/4.0.9/charts/common-10.1.4.tgz diff --git a/stable/promcord/4.0.8/ci/no-values.yaml b/stable/promcord/4.0.9/ci/no-values.yaml similarity index 100% rename from stable/promcord/4.0.8/ci/no-values.yaml rename to stable/promcord/4.0.9/ci/no-values.yaml diff --git a/stable/promcord/4.0.8/helm-values.md b/stable/promcord/4.0.9/helm-values.md similarity index 100% rename from stable/promcord/4.0.8/helm-values.md rename to stable/promcord/4.0.9/helm-values.md diff --git a/stable/promcord/4.0.8/ix_values.yaml b/stable/promcord/4.0.9/ix_values.yaml similarity index 100% rename from stable/promcord/4.0.8/ix_values.yaml rename to stable/promcord/4.0.9/ix_values.yaml diff --git a/stable/promcord/4.0.8/questions.yaml b/stable/promcord/4.0.9/questions.yaml similarity index 100% rename from stable/promcord/4.0.8/questions.yaml rename to stable/promcord/4.0.9/questions.yaml diff --git a/stable/promcord/4.0.8/security.md b/stable/promcord/4.0.9/security.md similarity index 96% rename from stable/promcord/4.0.8/security.md rename to stable/promcord/4.0.9/security.md index 238fc2d7d56..43c74767f50 100644 --- a/stable/promcord/4.0.8/security.md +++ b/stable/promcord/4.0.9/security.md @@ -136,10 +136,10 @@ hide: | libsmartcols1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| | libss2 | CVE-2022-1304 | HIGH | 1.46.2-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
| -| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libssl1.1 | CVE-2022-1292 | CRITICAL | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| libssl1.1 | CVE-2022-2068 | CRITICAL | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
| | libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| | libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4160
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| libssl1.1 | CVE-2022-2068 | MEDIUM | 1.1.1k-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
| | libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | libsystemd0 | CVE-2021-3997 | MEDIUM | 247.3-6 | 247.3-7 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
| @@ -164,10 +164,10 @@ hide: | ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| | ncurses-bin | CVE-2022-29458 | HIGH | 6.2+20201114-2 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-29458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458
https://invisible-island.net/ncurses/NEWS.html#t20220416
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29458
https://ubuntu.com/security/notices/USN-5477-1
| | ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 | |
Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://ubuntu.com/security/notices/USN-5477-1
| -| openssl | CVE-2022-1292 | CRITICAL | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl | CVE-2022-1292 | CRITICAL | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://security.netapp.com/advisory/ntap-20220602-0009/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
| +| openssl | CVE-2022-2068 | CRITICAL | 1.1.1k-1+deb11u1 | 1.1.1n-0+deb11u3 |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
| | openssl | CVE-2022-0778 | HIGH | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
| | openssl | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 |
Expand...https://access.redhat.com/security/cve/CVE-2021-4160
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220128.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
| -| openssl | CVE-2022-2068 | MEDIUM | 1.1.1k-1+deb11u1 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://ubuntu.com/security/notices/USN-5488-1
https://www.openssl.org/news/secadv/20220621.txt
| | openssl | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/
http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
http://rump2007.cr.yp.to/15-shumow.pdf
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
http://www.securityfocus.com/bid/63657
https://access.redhat.com/security/cve/CVE-2007-6755
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
| | openssl | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 | |
Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/
http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
http://www.osvdb.org/62808
http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
https://access.redhat.com/security/cve/CVE-2010-0928
https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
| | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 | |
Expand...http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
| @@ -179,7 +179,7 @@ hide: | util-linux | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | util-linux | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 |
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
| | util-linux | CVE-2022-0563 | LOW | 2.36.1-8 | |
Expand...https://access.redhat.com/security/cve/CVE-2022-0563
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.netapp.com/advisory/ntap-20220331-0002/
| -| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| +| zlib1g | CVE-2018-25032 | HIGH | 1:1.2.11.dfsg-2 | 1:1.2.11.dfsg-2+deb11u1 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| **jar** diff --git a/stable/promcord/4.0.8/templates/common.yaml b/stable/promcord/4.0.9/templates/common.yaml similarity index 100% rename from stable/promcord/4.0.8/templates/common.yaml rename to stable/promcord/4.0.9/templates/common.yaml diff --git a/stable/promcord/4.0.8/templates/prometheusrules.yaml b/stable/promcord/4.0.9/templates/prometheusrules.yaml similarity index 73% rename from stable/promcord/4.0.8/templates/prometheusrules.yaml rename to stable/promcord/4.0.9/templates/prometheusrules.yaml index f049742a258..cfa038ff0f6 100644 --- a/stable/promcord/4.0.8/templates/prometheusrules.yaml +++ b/stable/promcord/4.0.9/templates/prometheusrules.yaml @@ -2,22 +2,22 @@ apiVersion: monitoring.coreos.com/v1 kind: PrometheusRule metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.prometheusRule.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: groups: - - name: {{ include "common.names.fullname" . }} + - name: {{ include "tc.common.names.fullname" . }} rules: - alert: PromcordAbsent annotations: description: Promcord has disappeared from Prometheus service discovery. summary: Promcord is down. expr: | - absent(up{job=~".*{{ include "common.names.fullname" . }}.*"} == 1) + absent(up{job=~".*{{ include "tc.common.names.fullname" . }}.*"} == 1) for: 5m labels: severity: critical diff --git a/stable/unpoller/3.0.8/templates/servicemonitor.yaml b/stable/promcord/4.0.9/templates/servicemonitor.yaml similarity index 75% rename from stable/unpoller/3.0.8/templates/servicemonitor.yaml rename to stable/promcord/4.0.9/templates/servicemonitor.yaml index b4245480567..9e5ddea1095 100644 --- a/stable/unpoller/3.0.8/templates/servicemonitor.yaml +++ b/stable/promcord/4.0.9/templates/servicemonitor.yaml @@ -2,16 +2,16 @@ apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.serviceMonitor.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: selector: matchLabels: - {{- include "common.labels.selectorLabels" . | nindent 6 }} + {{- include "tc.common.labels.selectorLabels" . | nindent 6 }} endpoints: - port: metrics {{- with .Values.metrics.serviceMonitor.interval }} diff --git a/stable/promcord/4.0.8/values.yaml b/stable/promcord/4.0.9/values.yaml similarity index 100% rename from stable/promcord/4.0.8/values.yaml rename to stable/promcord/4.0.9/values.yaml diff --git a/stable/speedtest-exporter/3.0.8/CHANGELOG.md b/stable/speedtest-exporter/3.0.9/CHANGELOG.md similarity index 90% rename from stable/speedtest-exporter/3.0.8/CHANGELOG.md rename to stable/speedtest-exporter/3.0.9/CHANGELOG.md index 10fb03058c0..717692ff6f0 100644 --- a/stable/speedtest-exporter/3.0.8/CHANGELOG.md +++ b/stable/speedtest-exporter/3.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [speedtest-exporter-3.0.9](https://github.com/truecharts/apps/compare/speedtest-exporter-3.0.8...speedtest-exporter-3.0.9) (2022-06-30) + +#### Fix + +* change some common references to tc.common ([#3019](https://github.com/truecharts/apps/issues/3019)) + + + ### [speedtest-exporter-3.0.8](https://github.com/truecharts/apps/compare/speedtest-exporter-3.0.7...speedtest-exporter-3.0.8) (2022-06-25) @@ -88,12 +97,3 @@ * BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - - -### [speedtest-exporter-2.0.24](https://github.com/truecharts/apps/compare/speedtest-exporter-2.0.23...speedtest-exporter-2.0.24) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) - diff --git a/stable/speedtest-exporter/3.0.8/CONFIG.md b/stable/speedtest-exporter/3.0.9/CONFIG.md similarity index 100% rename from stable/speedtest-exporter/3.0.8/CONFIG.md rename to stable/speedtest-exporter/3.0.9/CONFIG.md diff --git a/stable/promcord/4.0.8/Chart.lock b/stable/speedtest-exporter/3.0.9/Chart.lock similarity index 80% rename from stable/promcord/4.0.8/Chart.lock rename to stable/speedtest-exporter/3.0.9/Chart.lock index 3090a78ec74..86666aa35b1 100644 --- a/stable/promcord/4.0.8/Chart.lock +++ b/stable/speedtest-exporter/3.0.9/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://library-charts.truecharts.org version: 10.1.4 digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 -generated: "2022-06-25T14:23:43.469614634Z" +generated: "2022-06-30T08:51:29.764243204Z" diff --git a/stable/speedtest-exporter/3.0.8/Chart.yaml b/stable/speedtest-exporter/3.0.9/Chart.yaml similarity index 98% rename from stable/speedtest-exporter/3.0.8/Chart.yaml rename to stable/speedtest-exporter/3.0.9/Chart.yaml index a2939e8bdf3..4d8e7d73ace 100644 --- a/stable/speedtest-exporter/3.0.8/Chart.yaml +++ b/stable/speedtest-exporter/3.0.9/Chart.yaml @@ -21,7 +21,7 @@ name: speedtest-exporter sources: - https://github.com/MiguelNdeCarvalho/speedtest-exporter/ type: application -version: 3.0.8 +version: 3.0.9 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/speedtest-exporter/3.0.8/README.md b/stable/speedtest-exporter/3.0.9/README.md similarity index 100% rename from stable/speedtest-exporter/3.0.8/README.md rename to stable/speedtest-exporter/3.0.9/README.md diff --git a/stable/speedtest-exporter/3.0.8/app-readme.md b/stable/speedtest-exporter/3.0.9/app-readme.md similarity index 100% rename from stable/speedtest-exporter/3.0.8/app-readme.md rename to stable/speedtest-exporter/3.0.9/app-readme.md diff --git a/stable/speedtest-exporter/3.0.8/charts/common-10.1.4.tgz b/stable/speedtest-exporter/3.0.9/charts/common-10.1.4.tgz similarity index 100% rename from stable/speedtest-exporter/3.0.8/charts/common-10.1.4.tgz rename to stable/speedtest-exporter/3.0.9/charts/common-10.1.4.tgz diff --git a/stable/speedtest-exporter/3.0.8/helm-values.md b/stable/speedtest-exporter/3.0.9/helm-values.md similarity index 100% rename from stable/speedtest-exporter/3.0.8/helm-values.md rename to stable/speedtest-exporter/3.0.9/helm-values.md diff --git a/stable/speedtest-exporter/3.0.8/ix_values.yaml b/stable/speedtest-exporter/3.0.9/ix_values.yaml similarity index 100% rename from stable/speedtest-exporter/3.0.8/ix_values.yaml rename to stable/speedtest-exporter/3.0.9/ix_values.yaml diff --git a/stable/speedtest-exporter/3.0.8/questions.yaml b/stable/speedtest-exporter/3.0.9/questions.yaml similarity index 100% rename from stable/speedtest-exporter/3.0.8/questions.yaml rename to stable/speedtest-exporter/3.0.9/questions.yaml diff --git a/stable/speedtest-exporter/3.0.8/security.md b/stable/speedtest-exporter/3.0.9/security.md similarity index 100% rename from stable/speedtest-exporter/3.0.8/security.md rename to stable/speedtest-exporter/3.0.9/security.md diff --git a/stable/speedtest-exporter/3.0.8/templates/common.yaml b/stable/speedtest-exporter/3.0.9/templates/common.yaml similarity index 100% rename from stable/speedtest-exporter/3.0.8/templates/common.yaml rename to stable/speedtest-exporter/3.0.9/templates/common.yaml diff --git a/stable/speedtest-exporter/3.0.8/templates/prometheusrules.yaml b/stable/speedtest-exporter/3.0.9/templates/prometheusrules.yaml similarity index 84% rename from stable/speedtest-exporter/3.0.8/templates/prometheusrules.yaml rename to stable/speedtest-exporter/3.0.9/templates/prometheusrules.yaml index eff07133af4..057fa27f195 100644 --- a/stable/speedtest-exporter/3.0.8/templates/prometheusrules.yaml +++ b/stable/speedtest-exporter/3.0.9/templates/prometheusrules.yaml @@ -2,22 +2,22 @@ apiVersion: monitoring.coreos.com/v1 kind: PrometheusRule metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.prometheusRule.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: groups: - - name: {{ include "common.names.fullname" . }} + - name: {{ include "tc.common.names.fullname" . }} rules: - alert: SpeedtestExporterAbsent annotations: description: Speedtest Exporter has disappeared from Prometheus target discovery. summary: Speedtest Exporter is down. expr: | - absent(up{job=~".*{{ include "common.names.fullname" . }}.*"} == 1) + absent(up{job=~".*{{ include "tc.common.names.fullname" . }}.*"} == 1) for: {{ trimAll "m" .Values.metrics.serviceMonitor.interval | add 15 }}m labels: severity: critical @@ -26,7 +26,7 @@ spec: description: Internet download speed is averaging {{ "{{ humanize $value }}" }} Mbps. summary: SpeedTest slow internet download. expr: | - avg_over_time(speedtest_download_bits_per_second{job=~".*{{ include "common.names.fullname" . }}.*"}[4h]) + avg_over_time(speedtest_download_bits_per_second{job=~".*{{ include "tc.common.names.fullname" . }}.*"}[4h]) < {{ .Values.metrics.prometheusRule.downloadLimit }} for: 0m labels: @@ -36,7 +36,7 @@ spec: description: Internet upload speed is averaging {{ "{{ humanize $value }}" }} Mbps. summary: SpeedTest slow internet upload. expr: | - avg_over_time(speedtest_upload_bits_per_second{job=~".*{{ include "common.names.fullname" . }}.*"}[4h]) + avg_over_time(speedtest_upload_bits_per_second{job=~".*{{ include "tc.common.names.fullname" . }}.*"}[4h]) < {{ .Values.metrics.prometheusRule.uploadLimit }} for: 0m labels: @@ -46,7 +46,7 @@ spec: description: Internet ping latency is averaging {{ "{{ humanize $value }}" }} ms. summary: SpeedTest high ping latency. expr: | - avg_over_time(speedtest_ping_latency_milliseconds{job=~".*{{ include "common.names.fullname" . }}.*"}[4h]) + avg_over_time(speedtest_ping_latency_milliseconds{job=~".*{{ include "tc.common.names.fullname" . }}.*"}[4h]) > {{ .Values.metrics.prometheusRule.pingLimit }} for: 0m labels: @@ -56,7 +56,7 @@ spec: description: Internet jitter latency is averaging {{ "{{ humanize $value }}" }} ms. summary: SpeedTest high jitter latency. expr: | - avg_over_time(speedtest_jitter_latency_milliseconds{job=~".*{{ include "common.names.fullname" . }}.*"}[4h]) + avg_over_time(speedtest_jitter_latency_milliseconds{job=~".*{{ include "tc.common.names.fullname" . }}.*"}[4h]) > {{ .Values.metrics.prometheusRule.jitterLimit }} for: 0m labels: diff --git a/stable/uptimerobot-prometheus/4.0.8/templates/servicemonitor.yaml b/stable/speedtest-exporter/3.0.9/templates/servicemonitor.yaml similarity index 75% rename from stable/uptimerobot-prometheus/4.0.8/templates/servicemonitor.yaml rename to stable/speedtest-exporter/3.0.9/templates/servicemonitor.yaml index b4245480567..9e5ddea1095 100644 --- a/stable/uptimerobot-prometheus/4.0.8/templates/servicemonitor.yaml +++ b/stable/speedtest-exporter/3.0.9/templates/servicemonitor.yaml @@ -2,16 +2,16 @@ apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.serviceMonitor.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: selector: matchLabels: - {{- include "common.labels.selectorLabels" . | nindent 6 }} + {{- include "tc.common.labels.selectorLabels" . | nindent 6 }} endpoints: - port: metrics {{- with .Values.metrics.serviceMonitor.interval }} diff --git a/stable/speedtest-exporter/3.0.8/values.yaml b/stable/speedtest-exporter/3.0.9/values.yaml similarity index 100% rename from stable/speedtest-exporter/3.0.8/values.yaml rename to stable/speedtest-exporter/3.0.9/values.yaml diff --git a/stable/unpoller/3.0.8/Chart.lock b/stable/unpoller/3.0.8/Chart.lock deleted file mode 100644 index 64efe826f39..00000000000 --- a/stable/unpoller/3.0.8/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.1.4 -digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 -generated: "2022-06-25T14:40:57.260930446Z" diff --git a/stable/unpoller/3.0.8/CHANGELOG.md b/stable/unpoller/3.0.9/CHANGELOG.md similarity index 90% rename from stable/unpoller/3.0.8/CHANGELOG.md rename to stable/unpoller/3.0.9/CHANGELOG.md index 0a4ad0b2dbf..dd2ab1c6f89 100644 --- a/stable/unpoller/3.0.8/CHANGELOG.md +++ b/stable/unpoller/3.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [unpoller-3.0.9](https://github.com/truecharts/apps/compare/unpoller-3.0.8...unpoller-3.0.9) (2022-06-30) + +#### Fix + +* change some common references to tc.common ([#3019](https://github.com/truecharts/apps/issues/3019)) + + + ### [unpoller-3.0.8](https://github.com/truecharts/apps/compare/unpoller-3.0.7...unpoller-3.0.8) (2022-06-25) @@ -88,12 +97,3 @@ * BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - - -### [unpoller-2.0.19](https://github.com/truecharts/apps/compare/unpoller-2.0.18...unpoller-2.0.19) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) - diff --git a/stable/unpoller/3.0.8/CONFIG.md b/stable/unpoller/3.0.9/CONFIG.md similarity index 100% rename from stable/unpoller/3.0.8/CONFIG.md rename to stable/unpoller/3.0.9/CONFIG.md diff --git a/stable/unpoller/3.0.9/Chart.lock b/stable/unpoller/3.0.9/Chart.lock new file mode 100644 index 00000000000..b66901d43ff --- /dev/null +++ b/stable/unpoller/3.0.9/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.1.4 +digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 +generated: "2022-06-30T08:53:13.699966694Z" diff --git a/stable/unpoller/3.0.8/Chart.yaml b/stable/unpoller/3.0.9/Chart.yaml similarity index 98% rename from stable/unpoller/3.0.8/Chart.yaml rename to stable/unpoller/3.0.9/Chart.yaml index 285e4c527e4..f679bef8684 100644 --- a/stable/unpoller/3.0.8/Chart.yaml +++ b/stable/unpoller/3.0.9/Chart.yaml @@ -22,7 +22,7 @@ sources: - https://github.com/unifi-poller/unifi-poller - https://hub.docker.com/r/golift/unifi-poller type: application -version: 3.0.8 +version: 3.0.9 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/unpoller/3.0.8/README.md b/stable/unpoller/3.0.9/README.md similarity index 100% rename from stable/unpoller/3.0.8/README.md rename to stable/unpoller/3.0.9/README.md diff --git a/stable/unpoller/3.0.8/app-readme.md b/stable/unpoller/3.0.9/app-readme.md similarity index 100% rename from stable/unpoller/3.0.8/app-readme.md rename to stable/unpoller/3.0.9/app-readme.md diff --git a/stable/unpoller/3.0.8/charts/common-10.1.4.tgz b/stable/unpoller/3.0.9/charts/common-10.1.4.tgz similarity index 100% rename from stable/unpoller/3.0.8/charts/common-10.1.4.tgz rename to stable/unpoller/3.0.9/charts/common-10.1.4.tgz diff --git a/stable/unpoller/3.0.8/helm-values.md b/stable/unpoller/3.0.9/helm-values.md similarity index 100% rename from stable/unpoller/3.0.8/helm-values.md rename to stable/unpoller/3.0.9/helm-values.md diff --git a/stable/unpoller/3.0.8/ix_values.yaml b/stable/unpoller/3.0.9/ix_values.yaml similarity index 100% rename from stable/unpoller/3.0.8/ix_values.yaml rename to stable/unpoller/3.0.9/ix_values.yaml diff --git a/stable/unpoller/3.0.8/questions.yaml b/stable/unpoller/3.0.9/questions.yaml similarity index 100% rename from stable/unpoller/3.0.8/questions.yaml rename to stable/unpoller/3.0.9/questions.yaml diff --git a/stable/unpoller/3.0.8/security.md b/stable/unpoller/3.0.9/security.md similarity index 100% rename from stable/unpoller/3.0.8/security.md rename to stable/unpoller/3.0.9/security.md diff --git a/stable/unpoller/3.0.8/templates/common.yaml b/stable/unpoller/3.0.9/templates/common.yaml similarity index 100% rename from stable/unpoller/3.0.8/templates/common.yaml rename to stable/unpoller/3.0.9/templates/common.yaml diff --git a/stable/unpoller/3.0.8/templates/prometheusrules.yaml b/stable/unpoller/3.0.9/templates/prometheusrules.yaml similarity index 73% rename from stable/unpoller/3.0.8/templates/prometheusrules.yaml rename to stable/unpoller/3.0.9/templates/prometheusrules.yaml index e80273d6517..0482b8703f9 100644 --- a/stable/unpoller/3.0.8/templates/prometheusrules.yaml +++ b/stable/unpoller/3.0.9/templates/prometheusrules.yaml @@ -2,22 +2,22 @@ apiVersion: monitoring.coreos.com/v1 kind: PrometheusRule metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.prometheusRule.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: groups: - - name: {{ include "common.names.fullname" . }} + - name: {{ include "tc.common.names.fullname" . }} rules: - alert: UnifiPollerAbsent annotations: description: Unifi Poller has disappeared from Prometheus service discovery. summary: Unifi Poller is down. expr: | - absent(up{job=~".*{{ include "common.names.fullname" . }}.*"} == 1) + absent(up{job=~".*{{ include "tc.common.names.fullname" . }}.*"} == 1) for: 5m labels: severity: critical diff --git a/stable/speedtest-exporter/3.0.8/templates/servicemonitor.yaml b/stable/unpoller/3.0.9/templates/servicemonitor.yaml similarity index 75% rename from stable/speedtest-exporter/3.0.8/templates/servicemonitor.yaml rename to stable/unpoller/3.0.9/templates/servicemonitor.yaml index b4245480567..9e5ddea1095 100644 --- a/stable/speedtest-exporter/3.0.8/templates/servicemonitor.yaml +++ b/stable/unpoller/3.0.9/templates/servicemonitor.yaml @@ -2,16 +2,16 @@ apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.serviceMonitor.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: selector: matchLabels: - {{- include "common.labels.selectorLabels" . | nindent 6 }} + {{- include "tc.common.labels.selectorLabels" . | nindent 6 }} endpoints: - port: metrics {{- with .Values.metrics.serviceMonitor.interval }} diff --git a/stable/unpoller/3.0.8/values.yaml b/stable/unpoller/3.0.9/values.yaml similarity index 100% rename from stable/unpoller/3.0.8/values.yaml rename to stable/unpoller/3.0.9/values.yaml diff --git a/stable/uptimerobot-prometheus/4.0.8/Chart.lock b/stable/uptimerobot-prometheus/4.0.8/Chart.lock deleted file mode 100644 index 7ce9e7e35be..00000000000 --- a/stable/uptimerobot-prometheus/4.0.8/Chart.lock +++ /dev/null @@ -1,6 +0,0 @@ -dependencies: -- name: common - repository: https://library-charts.truecharts.org - version: 10.1.4 -digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 -generated: "2022-06-25T14:41:22.252781588Z" diff --git a/stable/uptimerobot-prometheus/4.0.8/CHANGELOG.md b/stable/uptimerobot-prometheus/4.0.9/CHANGELOG.md similarity index 90% rename from stable/uptimerobot-prometheus/4.0.8/CHANGELOG.md rename to stable/uptimerobot-prometheus/4.0.9/CHANGELOG.md index 449ab08c5ec..c29f8826e8e 100644 --- a/stable/uptimerobot-prometheus/4.0.8/CHANGELOG.md +++ b/stable/uptimerobot-prometheus/4.0.9/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [uptimerobot-prometheus-4.0.9](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-4.0.8...uptimerobot-prometheus-4.0.9) (2022-06-30) + +#### Fix + +* change some common references to tc.common ([#3019](https://github.com/truecharts/apps/issues/3019)) + + + ### [uptimerobot-prometheus-4.0.8](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-4.0.7...uptimerobot-prometheus-4.0.8) (2022-06-25) @@ -88,12 +97,3 @@ * BREAKING CHANGE ([#2836](https://github.com/truecharts/apps/issues/2836)) - - - -### [uptimerobot-prometheus-3.0.19](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-3.0.18...uptimerobot-prometheus-3.0.19) (2022-05-31) - -#### Chore - -* update helm general non-major helm releases ([#2803](https://github.com/truecharts/apps/issues/2803)) - diff --git a/stable/uptimerobot-prometheus/4.0.8/CONFIG.md b/stable/uptimerobot-prometheus/4.0.9/CONFIG.md similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/CONFIG.md rename to stable/uptimerobot-prometheus/4.0.9/CONFIG.md diff --git a/stable/uptimerobot-prometheus/4.0.9/Chart.lock b/stable/uptimerobot-prometheus/4.0.9/Chart.lock new file mode 100644 index 00000000000..4ac90e6c693 --- /dev/null +++ b/stable/uptimerobot-prometheus/4.0.9/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: common + repository: https://library-charts.truecharts.org + version: 10.1.4 +digest: sha256:0f159b86b96bd27bd8d967476e26de9a2a6db995faf0c091cbf1281ee4c4e3a2 +generated: "2022-06-30T08:53:21.592682237Z" diff --git a/stable/uptimerobot-prometheus/4.0.8/Chart.yaml b/stable/uptimerobot-prometheus/4.0.9/Chart.yaml similarity index 98% rename from stable/uptimerobot-prometheus/4.0.8/Chart.yaml rename to stable/uptimerobot-prometheus/4.0.9/Chart.yaml index 97a6c29ae7a..eaa9f7b668d 100644 --- a/stable/uptimerobot-prometheus/4.0.8/Chart.yaml +++ b/stable/uptimerobot-prometheus/4.0.9/Chart.yaml @@ -23,7 +23,7 @@ sources: - https://github.com/lekpamartin/uptimerobot_exporter - https://github.com/k8s-at-home/charts/tree/master/charts/uptimerobot-prometheus type: application -version: 4.0.8 +version: 4.0.9 annotations: truecharts.org/catagories: | - metrics diff --git a/stable/uptimerobot-prometheus/4.0.8/README.md b/stable/uptimerobot-prometheus/4.0.9/README.md similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/README.md rename to stable/uptimerobot-prometheus/4.0.9/README.md diff --git a/stable/uptimerobot-prometheus/4.0.8/app-readme.md b/stable/uptimerobot-prometheus/4.0.9/app-readme.md similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/app-readme.md rename to stable/uptimerobot-prometheus/4.0.9/app-readme.md diff --git a/stable/uptimerobot-prometheus/4.0.8/charts/common-10.1.4.tgz b/stable/uptimerobot-prometheus/4.0.9/charts/common-10.1.4.tgz similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/charts/common-10.1.4.tgz rename to stable/uptimerobot-prometheus/4.0.9/charts/common-10.1.4.tgz diff --git a/stable/uptimerobot-prometheus/4.0.8/helm-values.md b/stable/uptimerobot-prometheus/4.0.9/helm-values.md similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/helm-values.md rename to stable/uptimerobot-prometheus/4.0.9/helm-values.md diff --git a/stable/uptimerobot-prometheus/4.0.8/ix_values.yaml b/stable/uptimerobot-prometheus/4.0.9/ix_values.yaml similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/ix_values.yaml rename to stable/uptimerobot-prometheus/4.0.9/ix_values.yaml diff --git a/stable/uptimerobot-prometheus/4.0.8/questions.yaml b/stable/uptimerobot-prometheus/4.0.9/questions.yaml similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/questions.yaml rename to stable/uptimerobot-prometheus/4.0.9/questions.yaml diff --git a/stable/uptimerobot-prometheus/4.0.8/security.md b/stable/uptimerobot-prometheus/4.0.9/security.md similarity index 99% rename from stable/uptimerobot-prometheus/4.0.8/security.md rename to stable/uptimerobot-prometheus/4.0.9/security.md index 4a9b68deadc..b5b1b587ce6 100644 --- a/stable/uptimerobot-prometheus/4.0.8/security.md +++ b/stable/uptimerobot-prometheus/4.0.9/security.md @@ -179,7 +179,7 @@ hide: | ssl_client | CVE-2021-42386 | HIGH | 1.31.1-r16 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42386
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| | ssl_client | CVE-2021-42374 | MEDIUM | 1.31.1-r16 | 1.31.1-r21 |
Expand...https://access.redhat.com/security/cve/CVE-2021-42374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://nvd.nist.gov/vuln/detail/CVE-2021-42374
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| | xz-libs | CVE-2022-1271 | HIGH | 5.2.5-r0 | 5.2.5-r1 |
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-5052.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
| -| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| +| zlib | CVE-2018-25032 | HIGH | 1.2.11-r3 | 1.2.12-r0 |
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-2201.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://security.netapp.com/advisory/ntap-20220526-0009/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://ubuntu.com/security/notices/USN-5359-2
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3
| **python-pkg** diff --git a/stable/uptimerobot-prometheus/4.0.8/templates/common.yaml b/stable/uptimerobot-prometheus/4.0.9/templates/common.yaml similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/templates/common.yaml rename to stable/uptimerobot-prometheus/4.0.9/templates/common.yaml diff --git a/stable/uptimerobot-prometheus/4.0.8/templates/prometheusrules.yaml b/stable/uptimerobot-prometheus/4.0.9/templates/prometheusrules.yaml similarity index 74% rename from stable/uptimerobot-prometheus/4.0.8/templates/prometheusrules.yaml rename to stable/uptimerobot-prometheus/4.0.9/templates/prometheusrules.yaml index 93cd4d987ad..85f37b0b122 100644 --- a/stable/uptimerobot-prometheus/4.0.8/templates/prometheusrules.yaml +++ b/stable/uptimerobot-prometheus/4.0.9/templates/prometheusrules.yaml @@ -2,22 +2,22 @@ apiVersion: monitoring.coreos.com/v1 kind: PrometheusRule metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.prometheusRule.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: groups: - - name: {{ include "common.names.fullname" . }} + - name: {{ include "tc.common.names.fullname" . }} rules: - alert: UptimeRobotExporterAbsent annotations: description: Uptime Robot Exporter has disappeared from Prometheus service discovery. summary: Uptime Robot Exporter is down. expr: | - absent(up{job=~".*{{ include "common.names.fullname" . }}.*"} == 1) + absent(up{job=~".*{{ include "tc.common.names.fullname" . }}.*"} == 1) for: 5m labels: severity: critical diff --git a/stable/promcord/4.0.8/templates/servicemonitor.yaml b/stable/uptimerobot-prometheus/4.0.9/templates/servicemonitor.yaml similarity index 75% rename from stable/promcord/4.0.8/templates/servicemonitor.yaml rename to stable/uptimerobot-prometheus/4.0.9/templates/servicemonitor.yaml index b4245480567..9e5ddea1095 100644 --- a/stable/promcord/4.0.8/templates/servicemonitor.yaml +++ b/stable/uptimerobot-prometheus/4.0.9/templates/servicemonitor.yaml @@ -2,16 +2,16 @@ apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: - name: {{ include "common.names.fullname" . }} + name: {{ include "tc.common.names.fullname" . }} labels: - {{- include "common.labels" . | nindent 4 }} + {{- include "tc.common.labels" . | nindent 4 }} {{- with .Values.metrics.serviceMonitor.labels }} {{- toYaml . | nindent 4 }} {{- end }} spec: selector: matchLabels: - {{- include "common.labels.selectorLabels" . | nindent 6 }} + {{- include "tc.common.labels.selectorLabels" . | nindent 6 }} endpoints: - port: metrics {{- with .Values.metrics.serviceMonitor.interval }} diff --git a/stable/uptimerobot-prometheus/4.0.8/values.yaml b/stable/uptimerobot-prometheus/4.0.9/values.yaml similarity index 100% rename from stable/uptimerobot-prometheus/4.0.8/values.yaml rename to stable/uptimerobot-prometheus/4.0.9/values.yaml