diff --git a/charts/core/prometheus/CHANGELOG.md b/charts/core/prometheus/CHANGELOG.md index b5dc4594aeb..1476aca6f8a 100644 --- a/charts/core/prometheus/CHANGELOG.md +++ b/charts/core/prometheus/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prometheus-1.1.34](https://github.com/truecharts/apps/compare/prometheus-1.1.33...prometheus-1.1.34) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [prometheus-1.1.33](https://github.com/truecharts/apps/compare/prometheus-1.1.32...prometheus-1.1.33) (2022-01-03) diff --git a/charts/core/prometheus/helm-values.md b/charts/core/prometheus/helm-values.md index c5ab816547a..cf2ff37e110 100644 --- a/charts/core/prometheus/helm-values.md +++ b/charts/core/prometheus/helm-values.md @@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here | alertmanager.volumeMounts | list | `[]` | | | alertmanager.volumes | list | `[]` | | | alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | | -| alertmanagerImage.tag | string | `"v0.23.0@sha256:af7fd554b16af3da08ad586099580fbe3009f20e4645e2f3e777b47488e0864e"` | | +| alertmanagerImage.tag | string | `"v0.23.0@sha256:7039c919e5ba9ae15ad762daea3e66de922dc644986efa888ff6b298645ee52f"` | | | coreDns.enabled | bool | `true` | | | coreDns.namespace | string | `"kube-system"` | | | coreDns.service.enabled | bool | `true` | | @@ -104,7 +104,7 @@ You will, however, be able to use all values referenced in the common chart here | exporters.node-exporter.enabled | bool | `true` | | | global.labels | object | `{}` | | | image.repository | string | `"tccr.io/truecharts/prometheus-operator"` | | -| image.tag | string | `"v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311"` | | +| image.tag | string | `"v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7"` | | | ingress.alertmanager.enabled | bool | `false` | | | ingress.main.enabled | bool | `false` | | | ingress.thanos.enabled | bool | `false` | | @@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here | prometheus.volumes | list | `[]` | | | prometheus.walCompression | bool | `false` | | | prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | | -| prometheusImage.tag | string | `"v2.32.1@sha256:590ea3b1f942eaa4936306e4d7ca125455884bddbdac9012881f527818bdf3fe"` | | +| prometheusImage.tag | string | `"v2.32.1@sha256:38751ed343cd65026bf268e7040619fde670214f14ca092d914cf836595ab740"` | | | rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created | | securityContext.readOnlyRootFilesystem | bool | `false` | | | service.alertmanager.enabled | bool | `true` | | diff --git a/charts/core/prometheus/security.md b/charts/core/prometheus/security.md index adc821a1032..61a13d30df6 100644 --- a/charts/core/prometheus/security.md +++ b/charts/core/prometheus/security.md @@ -168,7 +168,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311 + tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7 bitnami/node-exporter:1.3.1-debian-10-r0 bitnami/kube-state-metrics:2.3.0-debian-10-r0 @@ -207,7 +207,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311 (debian 10.11) +#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7 (debian 10.11) **debian** diff --git a/charts/dependency/memcached/CHANGELOG.md b/charts/dependency/memcached/CHANGELOG.md index 144073608c2..bdd958a3df6 100644 --- a/charts/dependency/memcached/CHANGELOG.md +++ b/charts/dependency/memcached/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [memcached-1.0.44](https://github.com/truecharts/apps/compare/memcached-1.0.43...memcached-1.0.44) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [memcached-1.0.43](https://github.com/truecharts/apps/compare/memcached-1.0.42...memcached-1.0.43) (2022-01-03) diff --git a/charts/dependency/memcached/helm-values.md b/charts/dependency/memcached/helm-values.md index 08dc293ab0e..2d1cb89723f 100644 --- a/charts/dependency/memcached/helm-values.md +++ b/charts/dependency/memcached/helm-values.md @@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/memcached"` | | -| image.tag | string | `"v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126"` | | +| image.tag | string | `"v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926"` | | | service.main.ports.main.port | int | `11211` | | | service.main.ports.main.targetPort | int | `11211` | | diff --git a/charts/dependency/memcached/security.md b/charts/dependency/memcached/security.md index 1189525f73c..51ffeccd078 100644 --- a/charts/dependency/memcached/security.md +++ b/charts/dependency/memcached/security.md @@ -31,7 +31,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126 + tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926 ##### Scan Results @@ -68,7 +68,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126 (debian 10.11) +#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926 (debian 10.11) **debian** diff --git a/charts/dependency/postgresql/CHANGELOG.md b/charts/dependency/postgresql/CHANGELOG.md index d1083084907..abb23455b14 100644 --- a/charts/dependency/postgresql/CHANGELOG.md +++ b/charts/dependency/postgresql/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [postgresql-6.0.42](https://github.com/truecharts/apps/compare/postgresql-6.0.41...postgresql-6.0.42) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [postgresql-6.0.41](https://github.com/truecharts/apps/compare/postgresql-6.0.40...postgresql-6.0.41) (2022-01-03) diff --git a/charts/dependency/postgresql/helm-values.md b/charts/dependency/postgresql/helm-values.md index 7f1c293ce70..1b848559681 100644 --- a/charts/dependency/postgresql/helm-values.md +++ b/charts/dependency/postgresql/helm-values.md @@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/postgresql"` | | -| image.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | | +| image.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | | | podSecurityContext.runAsGroup | int | `0` | | | postgrespassword | string | `"testroot"` | | | postgresqlDatabase | string | `"test"` | | diff --git a/charts/dependency/postgresql/security.md b/charts/dependency/postgresql/security.md index 7b052d5358d..b736b9d0275 100644 --- a/charts/dependency/postgresql/security.md +++ b/charts/dependency/postgresql/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31 + tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686 ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31 (debian 10.11) +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686 (debian 10.11) **debian** diff --git a/charts/dependency/redis/CHANGELOG.md b/charts/dependency/redis/CHANGELOG.md index eb4b3a9c152..1f0c4247f07 100644 --- a/charts/dependency/redis/CHANGELOG.md +++ b/charts/dependency/redis/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [redis-1.0.47](https://github.com/truecharts/apps/compare/redis-1.0.46...redis-1.0.47) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [redis-1.0.46](https://github.com/truecharts/apps/compare/redis-1.0.45...redis-1.0.46) (2022-01-03) diff --git a/charts/dependency/redis/helm-values.md b/charts/dependency/redis/helm-values.md index ef6a8a5344b..c2469731851 100644 --- a/charts/dependency/redis/helm-values.md +++ b/charts/dependency/redis/helm-values.md @@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/redis"` | | -| image.tag | string | `"v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797"` | | +| image.tag | string | `"v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb"` | | | persistence.redis-health | object | See below | redis-health configmap mount | | persistence.redis-health.mountPath | string | `"/health"` | Where to mount the volume in the main container. Defaults to `/`, setting to '-' creates the volume but disables the volumeMount. | | persistence.redis-health.readOnly | bool | `false` | Specify if the volume should be mounted read-only. | diff --git a/charts/dependency/redis/security.md b/charts/dependency/redis/security.md index 2cdf01ec08a..593dcaad6b9 100644 --- a/charts/dependency/redis/security.md +++ b/charts/dependency/redis/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797 + tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797 (debian 10.11) +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb (debian 10.11) **debian** diff --git a/charts/library/common/CHANGELOG.md b/charts/library/common/CHANGELOG.md index 338b6a82c66..b3fb83be73e 100644 --- a/charts/library/common/CHANGELOG.md +++ b/charts/library/common/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [common-8.10.2](https://github.com/truecharts/apps/compare/common-8.10.1...common-8.10.2) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [common-8.10.1](https://github.com/truecharts/apps/compare/common-8.10.0...common-8.10.1) (2022-01-03) diff --git a/charts/library/common/helm-values.md b/charts/library/common/helm-values.md index 76751e63b38..bb670bac532 100644 --- a/charts/library/common/helm-values.md +++ b/charts/library/common/helm-values.md @@ -183,7 +183,7 @@ This chart is used by a lot of our Apps to provide sane defaults and logic. | postgresqlImage | object | See below | postgresql specific configuration | | postgresqlImage.pullPolicy | string | `"IfNotPresent"` | Specify the postgresql image pull policy | | postgresqlImage.repository | string | `"ghcr.io/truecharts/postgresql"` | Specify the postgresql image | -| postgresqlImage.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | Specify the postgresql image tag | +| postgresqlImage.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | Specify the postgresql image tag | | priorityClassName | string | `nil` | | | probes | object | See below | Probe configuration -- [[ref]](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/) | | probes.liveness | object | See below | Liveness probe configuration | diff --git a/charts/stable/appdaemon/CHANGELOG.md b/charts/stable/appdaemon/CHANGELOG.md index d7ce246f14c..7eba8353afb 100644 --- a/charts/stable/appdaemon/CHANGELOG.md +++ b/charts/stable/appdaemon/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [appdaemon-7.0.9](https://github.com/truecharts/apps/compare/appdaemon-7.0.8...appdaemon-7.0.9) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [appdaemon-7.0.8](https://github.com/truecharts/apps/compare/appdaemon-7.0.7...appdaemon-7.0.8) (2021-12-28) diff --git a/charts/stable/appdaemon/Chart.yaml b/charts/stable/appdaemon/Chart.yaml index df23a40f8e2..a178671e0d1 100644 --- a/charts/stable/appdaemon/Chart.yaml +++ b/charts/stable/appdaemon/Chart.yaml @@ -1,5 +1,5 @@ apiVersion: v2 -appVersion: "4.1.0" +appVersion: "4.2.0" dependencies: - name: common repository: https://truecharts.org diff --git a/charts/stable/appdaemon/helm-values.md b/charts/stable/appdaemon/helm-values.md index 2bc4ebb02b3..de528094bda 100644 --- a/charts/stable/appdaemon/helm-values.md +++ b/charts/stable/appdaemon/helm-values.md @@ -18,7 +18,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"America/Chicago"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/appdaemon"` | | -| image.tag | string | `"v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6"` | | +| image.tag | string | `"v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5"` | | | persistence.conf.enabled | bool | `true` | | | persistence.conf.mountPath | string | `"/conf"` | | | persistence.varrun.enabled | bool | `true` | | diff --git a/charts/stable/appdaemon/security.md b/charts/stable/appdaemon/security.md index ad7f736a8e2..63128798fe9 100644 --- a/charts/stable/appdaemon/security.md +++ b/charts/stable/appdaemon/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6 + tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5 ##### Scan Results @@ -69,76 +69,20 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6 (alpine 3.14.1) +#### Container: tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5 (alpine 3.15.0) **alpine** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libuuid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| -| openssl-dev | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| openssl-dev | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| No Vulnerabilities found | +|:---------------------------------| + + **python-pkg** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| aiohttp | pyup.io-42692 | UNKNOWN | 3.7.4.post0 | 3.8.0 |
Expand...
| - -**cargo** - - -| No Vulnerabilities found | -|:---------------------------------| - - - -**cargo** - - -| No Vulnerabilities found | -|:---------------------------------| - - - -**cargo** - - | No Vulnerabilities found | |:---------------------------------| @@ -151,36 +95,25 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | chrono | RUSTSEC-2020-0159 | UNKNOWN | 0.4.19 | |
Expand...https://github.com/chronotope/chrono/issues/499
| | cpuid-bool | RUSTSEC-2021-0064 | UNKNOWN | 0.1.2 | |
Expand...https://github.com/RustCrypto/utils/pull/381
| -| crossbeam-deque | RUSTSEC-2021-0093 | UNKNOWN | 0.7.3 | >= 0.7.4, < 0.8.0, >= 0.8.1 |
Expand...https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
| | difference | RUSTSEC-2020-0095 | UNKNOWN | 2.0.0 | |
Expand...https://github.com/johannhof/difference.rs/issues/45
| -| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.1 | |
Expand...https://github.com/dirs-dev/directories-rs
| +| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.2 | |
Expand...https://github.com/dirs-dev/directories-rs
| | dirs | RUSTSEC-2020-0053 | UNKNOWN | 2.0.2 | |
Expand...https://github.com/dirs-dev/dirs-rs
| | lock_api | RUSTSEC-2020-0070 | UNKNOWN | 0.4.1 | >= 0.4.2 |
Expand...https://github.com/Amanieu/parking_lot/pull/262
| -| memmap | RUSTSEC-2020-0077 | UNKNOWN | 0.7.0 | |
Expand...https://github.com/danburkert/memmap-rs/issues/90
| -| net2 | RUSTSEC-2020-0016 | UNKNOWN | 0.2.36 | |
Expand...https://github.com/deprecrated/net2-rs/commit/3350e3819adf151709047e93f25583a5df681091
| -| openssl-src | RUSTSEC-2021-0055 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 |
Expand...https://www.openssl.org/news/secadv/20210325.txt
| -| openssl-src | RUSTSEC-2021-0056 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 |
Expand...https://www.openssl.org/news/secadv/20210325.txt
| -| openssl-src | RUSTSEC-2021-0057 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 |
Expand...https://www.openssl.org/news/secadv/20210216.txt
| -| openssl-src | RUSTSEC-2021-0058 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 |
Expand...https://www.openssl.org/news/secadv/20210216.txt
| -| openssl-src | RUSTSEC-2021-0097 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 |
Expand...https://www.openssl.org/news/secadv/20210824.txt
| -| openssl-src | RUSTSEC-2021-0098 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 |
Expand...https://www.openssl.org/news/secadv/20210824.txt
| -| tar | RUSTSEC-2021-0080 | UNKNOWN | 0.4.29 | >= 0.4.36 |
Expand...https://github.com/alexcrichton/tar-rs/issues/238
| -| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | |
Expand...https://github.com/Stebalien/term/issues/93
| | term | RUSTSEC-2018-0015 | UNKNOWN | 0.6.1 | |
Expand...https://github.com/Stebalien/term/issues/93
| | time | RUSTSEC-2020-0071 | UNKNOWN | 0.1.43 | >= 0.2.23 |
Expand...https://github.com/time-rs/time/issues/293
| -| tokio | RUSTSEC-2021-0124 | UNKNOWN | 0.2.24 | >= 1.8.4, < 1.9.0, >= 1.13.1 |
Expand...https://github.com/tokio-rs/tokio/issues/4225
| +| tokio | RUSTSEC-2021-0124 | UNKNOWN | 1.8.2 | >= 1.8.4, < 1.9.0, >= 1.13.1 |
Expand...https://github.com/tokio-rs/tokio/issues/4225
| | yaml-rust | RUSTSEC-2018-0006 | UNKNOWN | 0.3.5 | >= 0.4.1 |
Expand...https://github.com/chyh1990/yaml-rust/pull/109
| **cargo** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| cranelift-codegen | RUSTSEC-2021-0067 | UNKNOWN | 0.70.0 | >= 0.73.1 |
Expand...https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5
| +| No Vulnerabilities found | +|:---------------------------------| + + **cargo** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | |
Expand...https://github.com/Stebalien/term/issues/93
| +| No Vulnerabilities found | +|:---------------------------------| diff --git a/charts/stable/grafana/CHANGELOG.md b/charts/stable/grafana/CHANGELOG.md index c73eb6b739c..94c688108c1 100644 --- a/charts/stable/grafana/CHANGELOG.md +++ b/charts/stable/grafana/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grafana-2.0.16](https://github.com/truecharts/apps/compare/grafana-2.0.15...grafana-2.0.16) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [grafana-2.0.15](https://github.com/truecharts/apps/compare/grafana-2.0.14...grafana-2.0.15) (2022-01-03) diff --git a/charts/stable/grafana/helm-values.md b/charts/stable/grafana/helm-values.md index 1338271b51a..adf4db0b776 100644 --- a/charts/stable/grafana/helm-values.md +++ b/charts/stable/grafana/helm-values.md @@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here | env.GF_PATHS_PROVISIONING | string | `"/opt/bitnami/grafana/conf/provisioning"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/grafana"` | | -| image.tag | string | `"v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26"` | | +| image.tag | string | `"v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f"` | | | metrics.enabled | bool | See values.yaml | Enable and configure a Prometheus serviceMonitor for the chart under this key. | | metrics.prometheusRule | object | See values.yaml | Enable and configure Prometheus Rules for the chart under this key. | | metrics.prometheusRule.rules | list | See prometheusrules.yaml | Configure additionial rules for the chart under this key. | diff --git a/charts/stable/grafana/security.md b/charts/stable/grafana/security.md index f8a7c028664..7d78366ae08 100644 --- a/charts/stable/grafana/security.md +++ b/charts/stable/grafana/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26 + tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26 (debian 10.11) +#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f (debian 10.11) **debian** diff --git a/charts/stable/piaware/CHANGELOG.md b/charts/stable/piaware/CHANGELOG.md index ff604b359a5..1bdf8220c61 100644 --- a/charts/stable/piaware/CHANGELOG.md +++ b/charts/stable/piaware/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [piaware-4.0.36](https://github.com/truecharts/apps/compare/piaware-4.0.35...piaware-4.0.36) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [piaware-4.0.35](https://github.com/truecharts/apps/compare/piaware-4.0.34...piaware-4.0.35) (2022-01-03) diff --git a/charts/stable/piaware/helm-values.md b/charts/stable/piaware/helm-values.md index 46dfd400955..ed8a3b16373 100644 --- a/charts/stable/piaware/helm-values.md +++ b/charts/stable/piaware/helm-values.md @@ -16,7 +16,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"UTC"` | Set the container timezone | | image.pullPolicy | string | `"IfNotPresent"` | image pull policy | | image.repository | string | `"tccr.io/truecharts/piaware"` | image repository | -| image.tag | string | `"v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e"` | image tag | +| image.tag | string | `"v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c"` | image tag | | persistence | object | See values.yaml | Configure persistence settings for the chart under this key. | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/charts/stable/piaware/security.md b/charts/stable/piaware/security.md index 7ab8397ee2d..798aa48e108 100644 --- a/charts/stable/piaware/security.md +++ b/charts/stable/piaware/security.md @@ -33,7 +33,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e + tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c ##### Scan Results @@ -70,7 +70,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e (debian 10.11) +#### Container: tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c (debian 10.11) **debian** diff --git a/charts/stable/quassel-core/CHANGELOG.md b/charts/stable/quassel-core/CHANGELOG.md index 12ffacef66b..6b4230130e9 100644 --- a/charts/stable/quassel-core/CHANGELOG.md +++ b/charts/stable/quassel-core/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [quassel-core-0.0.10](https://github.com/truecharts/apps/compare/quassel-core-0.0.9...quassel-core-0.0.10) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [quassel-core-0.0.9](https://github.com/truecharts/apps/compare/quassel-core-0.0.8...quassel-core-0.0.9) (2021-12-28) diff --git a/charts/stable/quassel-core/Chart.yaml b/charts/stable/quassel-core/Chart.yaml index 8234189d577..beff255c5a5 100644 --- a/charts/stable/quassel-core/Chart.yaml +++ b/charts/stable/quassel-core/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 kubeVersion: ">=1.16.0-0" name: quassel-core version: 0.0.10 -appVersion: "0.13.1" +appVersion: "0.14.0" description: Quassel-core is a modern, cross-platform, distributed IRC client. type: application deprecated: false diff --git a/charts/stable/quassel-core/helm-values.md b/charts/stable/quassel-core/helm-values.md index 64ba6a657f9..2b5550074ae 100644 --- a/charts/stable/quassel-core/helm-values.md +++ b/charts/stable/quassel-core/helm-values.md @@ -23,7 +23,7 @@ You will, however, be able to use all values referenced in the common chart here | envValueFrom.DB_PGSQL_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/quassel-core"` | | -| image.tag | string | `"v0.13.1"` | | +| image.tag | string | `"v0.14.0"` | | | persistence.varrun.enabled | bool | `true` | | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/charts/stable/quassel-core/security.md b/charts/stable/quassel-core/security.md index 5ee282e69c5..b01e2b37ce0 100644 --- a/charts/stable/quassel-core/security.md +++ b/charts/stable/quassel-core/security.md @@ -52,7 +52,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:d1849137d3b53f5b5155d2a8d47fe0129b215d0c5b53a87096423f5c4feaf0e1 - tccr.io/truecharts/quassel-core:v0.13.1 + tccr.io/truecharts/quassel-core:v0.14.0 tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:f734751e367098b427baba1abec9728700f92e89d5dd370ae43910d7f2814b97 diff --git a/charts/stable/radarr/CHANGELOG.md b/charts/stable/radarr/CHANGELOG.md index 52492440898..5328c3d1904 100644 --- a/charts/stable/radarr/CHANGELOG.md +++ b/charts/stable/radarr/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [radarr-9.0.29](https://github.com/truecharts/apps/compare/radarr-9.0.28...radarr-9.0.29) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [radarr-9.0.28](https://github.com/truecharts/apps/compare/radarr-9.0.27...radarr-9.0.28) (2021-12-28) diff --git a/charts/stable/radarr/helm-values.md b/charts/stable/radarr/helm-values.md index cc8fe713f7b..35a664dccc0 100644 --- a/charts/stable/radarr/helm-values.md +++ b/charts/stable/radarr/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/radarr"` | | -| image.tag | string | `"v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f"` | | +| image.tag | string | `"v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | probes.liveness.custom | bool | `true` | | diff --git a/charts/stable/radarr/security.md b/charts/stable/radarr/security.md index 14b1de60a44..08a52301f0f 100644 --- a/charts/stable/radarr/security.md +++ b/charts/stable/radarr/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f + tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86 ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f (ubuntu 20.04) +#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86 (ubuntu 20.04) **ubuntu** diff --git a/docs/apps/common/helm-values.md b/docs/apps/common/helm-values.md index 76751e63b38..bb670bac532 100644 --- a/docs/apps/common/helm-values.md +++ b/docs/apps/common/helm-values.md @@ -183,7 +183,7 @@ This chart is used by a lot of our Apps to provide sane defaults and logic. | postgresqlImage | object | See below | postgresql specific configuration | | postgresqlImage.pullPolicy | string | `"IfNotPresent"` | Specify the postgresql image pull policy | | postgresqlImage.repository | string | `"ghcr.io/truecharts/postgresql"` | Specify the postgresql image | -| postgresqlImage.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | Specify the postgresql image tag | +| postgresqlImage.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | Specify the postgresql image tag | | priorityClassName | string | `nil` | | | probes | object | See below | Probe configuration -- [[ref]](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/) | | probes.liveness | object | See below | Liveness probe configuration | diff --git a/docs/apps/core/prometheus/CHANGELOG.md b/docs/apps/core/prometheus/CHANGELOG.md index b5dc4594aeb..1476aca6f8a 100644 --- a/docs/apps/core/prometheus/CHANGELOG.md +++ b/docs/apps/core/prometheus/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [prometheus-1.1.34](https://github.com/truecharts/apps/compare/prometheus-1.1.33...prometheus-1.1.34) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [prometheus-1.1.33](https://github.com/truecharts/apps/compare/prometheus-1.1.32...prometheus-1.1.33) (2022-01-03) diff --git a/docs/apps/core/prometheus/helm-values.md b/docs/apps/core/prometheus/helm-values.md index c5ab816547a..cf2ff37e110 100644 --- a/docs/apps/core/prometheus/helm-values.md +++ b/docs/apps/core/prometheus/helm-values.md @@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here | alertmanager.volumeMounts | list | `[]` | | | alertmanager.volumes | list | `[]` | | | alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | | -| alertmanagerImage.tag | string | `"v0.23.0@sha256:af7fd554b16af3da08ad586099580fbe3009f20e4645e2f3e777b47488e0864e"` | | +| alertmanagerImage.tag | string | `"v0.23.0@sha256:7039c919e5ba9ae15ad762daea3e66de922dc644986efa888ff6b298645ee52f"` | | | coreDns.enabled | bool | `true` | | | coreDns.namespace | string | `"kube-system"` | | | coreDns.service.enabled | bool | `true` | | @@ -104,7 +104,7 @@ You will, however, be able to use all values referenced in the common chart here | exporters.node-exporter.enabled | bool | `true` | | | global.labels | object | `{}` | | | image.repository | string | `"tccr.io/truecharts/prometheus-operator"` | | -| image.tag | string | `"v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311"` | | +| image.tag | string | `"v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7"` | | | ingress.alertmanager.enabled | bool | `false` | | | ingress.main.enabled | bool | `false` | | | ingress.thanos.enabled | bool | `false` | | @@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here | prometheus.volumes | list | `[]` | | | prometheus.walCompression | bool | `false` | | | prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | | -| prometheusImage.tag | string | `"v2.32.1@sha256:590ea3b1f942eaa4936306e4d7ca125455884bddbdac9012881f527818bdf3fe"` | | +| prometheusImage.tag | string | `"v2.32.1@sha256:38751ed343cd65026bf268e7040619fde670214f14ca092d914cf836595ab740"` | | | rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created | | securityContext.readOnlyRootFilesystem | bool | `false` | | | service.alertmanager.enabled | bool | `true` | | diff --git a/docs/apps/core/prometheus/security.md b/docs/apps/core/prometheus/security.md index adc821a1032..61a13d30df6 100644 --- a/docs/apps/core/prometheus/security.md +++ b/docs/apps/core/prometheus/security.md @@ -168,7 +168,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311 + tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7 bitnami/node-exporter:1.3.1-debian-10-r0 bitnami/kube-state-metrics:2.3.0-debian-10-r0 @@ -207,7 +207,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311 (debian 10.11) +#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7 (debian 10.11) **debian** diff --git a/docs/apps/dependency/memcached/CHANGELOG.md b/docs/apps/dependency/memcached/CHANGELOG.md index 144073608c2..bdd958a3df6 100644 --- a/docs/apps/dependency/memcached/CHANGELOG.md +++ b/docs/apps/dependency/memcached/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [memcached-1.0.44](https://github.com/truecharts/apps/compare/memcached-1.0.43...memcached-1.0.44) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [memcached-1.0.43](https://github.com/truecharts/apps/compare/memcached-1.0.42...memcached-1.0.43) (2022-01-03) diff --git a/docs/apps/dependency/memcached/helm-values.md b/docs/apps/dependency/memcached/helm-values.md index 08dc293ab0e..2d1cb89723f 100644 --- a/docs/apps/dependency/memcached/helm-values.md +++ b/docs/apps/dependency/memcached/helm-values.md @@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here |-----|------|---------|-------------| | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/memcached"` | | -| image.tag | string | `"v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126"` | | +| image.tag | string | `"v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926"` | | | service.main.ports.main.port | int | `11211` | | | service.main.ports.main.targetPort | int | `11211` | | diff --git a/docs/apps/dependency/memcached/security.md b/docs/apps/dependency/memcached/security.md index 1189525f73c..51ffeccd078 100644 --- a/docs/apps/dependency/memcached/security.md +++ b/docs/apps/dependency/memcached/security.md @@ -31,7 +31,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126 + tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926 ##### Scan Results @@ -68,7 +68,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126 (debian 10.11) +#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926 (debian 10.11) **debian** diff --git a/docs/apps/dependency/postgresql/CHANGELOG.md b/docs/apps/dependency/postgresql/CHANGELOG.md index d1083084907..abb23455b14 100644 --- a/docs/apps/dependency/postgresql/CHANGELOG.md +++ b/docs/apps/dependency/postgresql/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [postgresql-6.0.42](https://github.com/truecharts/apps/compare/postgresql-6.0.41...postgresql-6.0.42) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [postgresql-6.0.41](https://github.com/truecharts/apps/compare/postgresql-6.0.40...postgresql-6.0.41) (2022-01-03) diff --git a/docs/apps/dependency/postgresql/helm-values.md b/docs/apps/dependency/postgresql/helm-values.md index 7f1c293ce70..1b848559681 100644 --- a/docs/apps/dependency/postgresql/helm-values.md +++ b/docs/apps/dependency/postgresql/helm-values.md @@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/postgresql"` | | -| image.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | | +| image.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | | | podSecurityContext.runAsGroup | int | `0` | | | postgrespassword | string | `"testroot"` | | | postgresqlDatabase | string | `"test"` | | diff --git a/docs/apps/dependency/postgresql/security.md b/docs/apps/dependency/postgresql/security.md index 7b052d5358d..b736b9d0275 100644 --- a/docs/apps/dependency/postgresql/security.md +++ b/docs/apps/dependency/postgresql/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31 + tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686 ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31 (debian 10.11) +#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686 (debian 10.11) **debian** diff --git a/docs/apps/dependency/redis/CHANGELOG.md b/docs/apps/dependency/redis/CHANGELOG.md index eb4b3a9c152..1f0c4247f07 100644 --- a/docs/apps/dependency/redis/CHANGELOG.md +++ b/docs/apps/dependency/redis/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [redis-1.0.47](https://github.com/truecharts/apps/compare/redis-1.0.46...redis-1.0.47) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [redis-1.0.46](https://github.com/truecharts/apps/compare/redis-1.0.45...redis-1.0.46) (2022-01-03) diff --git a/docs/apps/dependency/redis/helm-values.md b/docs/apps/dependency/redis/helm-values.md index ef6a8a5344b..c2469731851 100644 --- a/docs/apps/dependency/redis/helm-values.md +++ b/docs/apps/dependency/redis/helm-values.md @@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here | existingSecret | string | `""` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"ghcr.io/truecharts/redis"` | | -| image.tag | string | `"v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797"` | | +| image.tag | string | `"v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb"` | | | persistence.redis-health | object | See below | redis-health configmap mount | | persistence.redis-health.mountPath | string | `"/health"` | Where to mount the volume in the main container. Defaults to `/`, setting to '-' creates the volume but disables the volumeMount. | | persistence.redis-health.readOnly | bool | `false` | Specify if the volume should be mounted read-only. | diff --git a/docs/apps/dependency/redis/security.md b/docs/apps/dependency/redis/security.md index 2cdf01ec08a..593dcaad6b9 100644 --- a/docs/apps/dependency/redis/security.md +++ b/docs/apps/dependency/redis/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797 + tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797 (debian 10.11) +#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb (debian 10.11) **debian** diff --git a/docs/apps/stable/appdaemon/CHANGELOG.md b/docs/apps/stable/appdaemon/CHANGELOG.md index d7ce246f14c..7eba8353afb 100644 --- a/docs/apps/stable/appdaemon/CHANGELOG.md +++ b/docs/apps/stable/appdaemon/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [appdaemon-7.0.9](https://github.com/truecharts/apps/compare/appdaemon-7.0.8...appdaemon-7.0.9) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [appdaemon-7.0.8](https://github.com/truecharts/apps/compare/appdaemon-7.0.7...appdaemon-7.0.8) (2021-12-28) diff --git a/docs/apps/stable/appdaemon/helm-values.md b/docs/apps/stable/appdaemon/helm-values.md index 2bc4ebb02b3..de528094bda 100644 --- a/docs/apps/stable/appdaemon/helm-values.md +++ b/docs/apps/stable/appdaemon/helm-values.md @@ -18,7 +18,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"America/Chicago"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/appdaemon"` | | -| image.tag | string | `"v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6"` | | +| image.tag | string | `"v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5"` | | | persistence.conf.enabled | bool | `true` | | | persistence.conf.mountPath | string | `"/conf"` | | | persistence.varrun.enabled | bool | `true` | | diff --git a/docs/apps/stable/appdaemon/security.md b/docs/apps/stable/appdaemon/security.md index ad7f736a8e2..63128798fe9 100644 --- a/docs/apps/stable/appdaemon/security.md +++ b/docs/apps/stable/appdaemon/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6 + tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5 ##### Scan Results @@ -69,76 +69,20 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6 (alpine 3.14.1) +#### Container: tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5 (alpine 3.15.0) **alpine** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 |
Expand...https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
| -| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| libuuid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 |
Expand...https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
| -| openssl-dev | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| openssl-dev | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 |
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
| -| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
| -| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| +| No Vulnerabilities found | +|:---------------------------------| + + **python-pkg** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| aiohttp | pyup.io-42692 | UNKNOWN | 3.7.4.post0 | 3.8.0 |
Expand...
| - -**cargo** - - -| No Vulnerabilities found | -|:---------------------------------| - - - -**cargo** - - -| No Vulnerabilities found | -|:---------------------------------| - - - -**cargo** - - | No Vulnerabilities found | |:---------------------------------| @@ -151,36 +95,25 @@ hide: |:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| | chrono | RUSTSEC-2020-0159 | UNKNOWN | 0.4.19 | |
Expand...https://github.com/chronotope/chrono/issues/499
| | cpuid-bool | RUSTSEC-2021-0064 | UNKNOWN | 0.1.2 | |
Expand...https://github.com/RustCrypto/utils/pull/381
| -| crossbeam-deque | RUSTSEC-2021-0093 | UNKNOWN | 0.7.3 | >= 0.7.4, < 0.8.0, >= 0.8.1 |
Expand...https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
| | difference | RUSTSEC-2020-0095 | UNKNOWN | 2.0.0 | |
Expand...https://github.com/johannhof/difference.rs/issues/45
| -| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.1 | |
Expand...https://github.com/dirs-dev/directories-rs
| +| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.2 | |
Expand...https://github.com/dirs-dev/directories-rs
| | dirs | RUSTSEC-2020-0053 | UNKNOWN | 2.0.2 | |
Expand...https://github.com/dirs-dev/dirs-rs
| | lock_api | RUSTSEC-2020-0070 | UNKNOWN | 0.4.1 | >= 0.4.2 |
Expand...https://github.com/Amanieu/parking_lot/pull/262
| -| memmap | RUSTSEC-2020-0077 | UNKNOWN | 0.7.0 | |
Expand...https://github.com/danburkert/memmap-rs/issues/90
| -| net2 | RUSTSEC-2020-0016 | UNKNOWN | 0.2.36 | |
Expand...https://github.com/deprecrated/net2-rs/commit/3350e3819adf151709047e93f25583a5df681091
| -| openssl-src | RUSTSEC-2021-0055 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 |
Expand...https://www.openssl.org/news/secadv/20210325.txt
| -| openssl-src | RUSTSEC-2021-0056 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 |
Expand...https://www.openssl.org/news/secadv/20210325.txt
| -| openssl-src | RUSTSEC-2021-0057 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 |
Expand...https://www.openssl.org/news/secadv/20210216.txt
| -| openssl-src | RUSTSEC-2021-0058 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 |
Expand...https://www.openssl.org/news/secadv/20210216.txt
| -| openssl-src | RUSTSEC-2021-0097 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 |
Expand...https://www.openssl.org/news/secadv/20210824.txt
| -| openssl-src | RUSTSEC-2021-0098 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 |
Expand...https://www.openssl.org/news/secadv/20210824.txt
| -| tar | RUSTSEC-2021-0080 | UNKNOWN | 0.4.29 | >= 0.4.36 |
Expand...https://github.com/alexcrichton/tar-rs/issues/238
| -| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | |
Expand...https://github.com/Stebalien/term/issues/93
| | term | RUSTSEC-2018-0015 | UNKNOWN | 0.6.1 | |
Expand...https://github.com/Stebalien/term/issues/93
| | time | RUSTSEC-2020-0071 | UNKNOWN | 0.1.43 | >= 0.2.23 |
Expand...https://github.com/time-rs/time/issues/293
| -| tokio | RUSTSEC-2021-0124 | UNKNOWN | 0.2.24 | >= 1.8.4, < 1.9.0, >= 1.13.1 |
Expand...https://github.com/tokio-rs/tokio/issues/4225
| +| tokio | RUSTSEC-2021-0124 | UNKNOWN | 1.8.2 | >= 1.8.4, < 1.9.0, >= 1.13.1 |
Expand...https://github.com/tokio-rs/tokio/issues/4225
| | yaml-rust | RUSTSEC-2018-0006 | UNKNOWN | 0.3.5 | >= 0.4.1 |
Expand...https://github.com/chyh1990/yaml-rust/pull/109
| **cargo** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| cranelift-codegen | RUSTSEC-2021-0067 | UNKNOWN | 0.70.0 | >= 0.73.1 |
Expand...https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5
| +| No Vulnerabilities found | +|:---------------------------------| + + **cargo** -| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links | -|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------| -| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | |
Expand...https://github.com/Stebalien/term/issues/93
| +| No Vulnerabilities found | +|:---------------------------------| diff --git a/docs/apps/stable/grafana/CHANGELOG.md b/docs/apps/stable/grafana/CHANGELOG.md index c73eb6b739c..94c688108c1 100644 --- a/docs/apps/stable/grafana/CHANGELOG.md +++ b/docs/apps/stable/grafana/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [grafana-2.0.16](https://github.com/truecharts/apps/compare/grafana-2.0.15...grafana-2.0.16) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [grafana-2.0.15](https://github.com/truecharts/apps/compare/grafana-2.0.14...grafana-2.0.15) (2022-01-03) diff --git a/docs/apps/stable/grafana/helm-values.md b/docs/apps/stable/grafana/helm-values.md index 1338271b51a..adf4db0b776 100644 --- a/docs/apps/stable/grafana/helm-values.md +++ b/docs/apps/stable/grafana/helm-values.md @@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here | env.GF_PATHS_PROVISIONING | string | `"/opt/bitnami/grafana/conf/provisioning"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/grafana"` | | -| image.tag | string | `"v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26"` | | +| image.tag | string | `"v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f"` | | | metrics.enabled | bool | See values.yaml | Enable and configure a Prometheus serviceMonitor for the chart under this key. | | metrics.prometheusRule | object | See values.yaml | Enable and configure Prometheus Rules for the chart under this key. | | metrics.prometheusRule.rules | list | See prometheusrules.yaml | Configure additionial rules for the chart under this key. | diff --git a/docs/apps/stable/grafana/security.md b/docs/apps/stable/grafana/security.md index f8a7c028664..7d78366ae08 100644 --- a/docs/apps/stable/grafana/security.md +++ b/docs/apps/stable/grafana/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26 + tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26 (debian 10.11) +#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f (debian 10.11) **debian** diff --git a/docs/apps/stable/piaware/CHANGELOG.md b/docs/apps/stable/piaware/CHANGELOG.md index ff604b359a5..1bdf8220c61 100644 --- a/docs/apps/stable/piaware/CHANGELOG.md +++ b/docs/apps/stable/piaware/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [piaware-4.0.36](https://github.com/truecharts/apps/compare/piaware-4.0.35...piaware-4.0.36) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [piaware-4.0.35](https://github.com/truecharts/apps/compare/piaware-4.0.34...piaware-4.0.35) (2022-01-03) diff --git a/docs/apps/stable/piaware/helm-values.md b/docs/apps/stable/piaware/helm-values.md index 46dfd400955..ed8a3b16373 100644 --- a/docs/apps/stable/piaware/helm-values.md +++ b/docs/apps/stable/piaware/helm-values.md @@ -16,7 +16,7 @@ You will, however, be able to use all values referenced in the common chart here | env.TZ | string | `"UTC"` | Set the container timezone | | image.pullPolicy | string | `"IfNotPresent"` | image pull policy | | image.repository | string | `"tccr.io/truecharts/piaware"` | image repository | -| image.tag | string | `"v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e"` | image tag | +| image.tag | string | `"v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c"` | image tag | | persistence | object | See values.yaml | Configure persistence settings for the chart under this key. | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/docs/apps/stable/piaware/security.md b/docs/apps/stable/piaware/security.md index 7ab8397ee2d..798aa48e108 100644 --- a/docs/apps/stable/piaware/security.md +++ b/docs/apps/stable/piaware/security.md @@ -33,7 +33,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e + tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c ##### Scan Results @@ -70,7 +70,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e (debian 10.11) +#### Container: tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c (debian 10.11) **debian** diff --git a/docs/apps/stable/quassel-core/CHANGELOG.md b/docs/apps/stable/quassel-core/CHANGELOG.md index 12ffacef66b..6b4230130e9 100644 --- a/docs/apps/stable/quassel-core/CHANGELOG.md +++ b/docs/apps/stable/quassel-core/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [quassel-core-0.0.10](https://github.com/truecharts/apps/compare/quassel-core-0.0.9...quassel-core-0.0.10) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [quassel-core-0.0.9](https://github.com/truecharts/apps/compare/quassel-core-0.0.8...quassel-core-0.0.9) (2021-12-28) diff --git a/docs/apps/stable/quassel-core/helm-values.md b/docs/apps/stable/quassel-core/helm-values.md index 64ba6a657f9..2b5550074ae 100644 --- a/docs/apps/stable/quassel-core/helm-values.md +++ b/docs/apps/stable/quassel-core/helm-values.md @@ -23,7 +23,7 @@ You will, however, be able to use all values referenced in the common chart here | envValueFrom.DB_PGSQL_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/quassel-core"` | | -| image.tag | string | `"v0.13.1"` | | +| image.tag | string | `"v0.14.0"` | | | persistence.varrun.enabled | bool | `true` | | | podSecurityContext.runAsGroup | int | `0` | | | podSecurityContext.runAsUser | int | `0` | | diff --git a/docs/apps/stable/quassel-core/security.md b/docs/apps/stable/quassel-core/security.md index 5ee282e69c5..b01e2b37ce0 100644 --- a/docs/apps/stable/quassel-core/security.md +++ b/docs/apps/stable/quassel-core/security.md @@ -52,7 +52,7 @@ hide: tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:d1849137d3b53f5b5155d2a8d47fe0129b215d0c5b53a87096423f5c4feaf0e1 - tccr.io/truecharts/quassel-core:v0.13.1 + tccr.io/truecharts/quassel-core:v0.14.0 tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c tccr.io/truecharts/postgresql:v14.1.0@sha256:f734751e367098b427baba1abec9728700f92e89d5dd370ae43910d7f2814b97 diff --git a/docs/apps/stable/radarr/CHANGELOG.md b/docs/apps/stable/radarr/CHANGELOG.md index 52492440898..5328c3d1904 100644 --- a/docs/apps/stable/radarr/CHANGELOG.md +++ b/docs/apps/stable/radarr/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [radarr-9.0.29](https://github.com/truecharts/apps/compare/radarr-9.0.28...radarr-9.0.29) (2022-01-04) + +#### Chore + +* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648)) + + + ### [radarr-9.0.28](https://github.com/truecharts/apps/compare/radarr-9.0.27...radarr-9.0.28) (2021-12-28) diff --git a/docs/apps/stable/radarr/helm-values.md b/docs/apps/stable/radarr/helm-values.md index cc8fe713f7b..35a664dccc0 100644 --- a/docs/apps/stable/radarr/helm-values.md +++ b/docs/apps/stable/radarr/helm-values.md @@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here | env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/radarr"` | | -| image.tag | string | `"v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f"` | | +| image.tag | string | `"v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86"` | | | persistence.config.enabled | bool | `true` | | | persistence.config.mountPath | string | `"/config"` | | | probes.liveness.custom | bool | `true` | | diff --git a/docs/apps/stable/radarr/security.md b/docs/apps/stable/radarr/security.md index 14b1de60a44..08a52301f0f 100644 --- a/docs/apps/stable/radarr/security.md +++ b/docs/apps/stable/radarr/security.md @@ -32,7 +32,7 @@ hide: ##### Detected Containers tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c - tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f + tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86 ##### Scan Results @@ -69,7 +69,7 @@ hide: | ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 |
Expand...https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
| -#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f (ubuntu 20.04) +#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86 (ubuntu 20.04) **ubuntu** diff --git a/docs/index.yaml b/docs/index.yaml index 85f81bfd929..c3344f61e1a 100644 --- a/docs/index.yaml +++ b/docs/index.yaml @@ -495,6 +495,43 @@ entries: - https://github.com/truecharts/apps/releases/download/apache-musicindex-2.0.21/apache-musicindex-2.0.21.tgz version: 2.0.21 appdaemon: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - utilities + truecharts.org/grade: U + apiVersion: v2 + appVersion: 4.2.0 + created: "2022-01-04T13:50:35.799825738Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + description: AppDaemon is a loosely coupled, multithreaded, sandboxed python execution + environment for writing automation apps for Home Assistant home automation software. + It also provides a configurable dashboard (HADashboard) suitable for wall mounted + tablets. + digest: 7b2c936ef8daf739b8e7f9c83a15a9236a359bc60f93eb4d8242a9dff4b0dcbe + home: https://github.com/truecharts/apps/tree/master/charts/stable/appdaemon + icon: https://truecharts.org/_static/img/appicons/appdaemon-icon.png + keywords: + - appdaemon + - homeautomation + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + - email: 20650065+warllo54@users.noreply.github.com + name: warllo54 + url: truecharts.org + name: appdaemon + sources: + - https://github.com/AppDaemon/appdaemon + type: application + urls: + - https://github.com/truecharts/apps/releases/download/appdaemon-7.0.9/appdaemon-7.0.9.tgz + version: 7.0.9 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -3225,6 +3262,27 @@ entries: - https://github.com/truecharts/apps/releases/download/collabora-online-9.0.20/collabora-online-9.0.20.tgz version: 9.0.20 common: + - apiVersion: v2 + appVersion: latest + created: "2022-01-04T13:50:35.9264658Z" + description: Function library for TrueCharts + digest: 78e1f9fd76dbe75b7c49bb0fd77adbc0628c12eddf1faa91fde352af3460c16c + home: https://github.com/truecharts/apps/tree/master/charts/common + icon: https://avatars.githubusercontent.com/u/76400755 + keywords: + - truecharts + - library-chart + - common + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: common + type: library + urls: + - https://github.com/truecharts/apps/releases/download/common-8.10.2/common-8.10.2.tgz + version: 8.10.2 - apiVersion: v2 appVersion: latest created: "2022-01-03T21:51:40.537842032Z" @@ -9971,6 +10029,41 @@ entries: - https://github.com/truecharts/apps/releases/download/gotify-5.0.13/gotify-5.0.13.tgz version: 5.0.13 grafana: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - metrics + truecharts.org/grade: U + apiVersion: v2 + appVersion: 8.3.3 + created: "2022-01-04T13:50:36.067464737Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + description: Grafana is an open source, feature rich metrics dashboard and graph + editor for Graphite, Elasticsearch, OpenTSDB, Prometheus and InfluxDB. + digest: b57ecf4671d45e1cc607ea42f3135e0173429a9c77a11fc0d7e24e5025d6abac + home: https://github.com/truecharts/apps/tree/master/charts/stable/grafana + icon: https://truecharts.org/_static/img/appicons/grafana-icon.png + keywords: + - analytics + - monitoring + - metrics + - logs + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: grafana + sources: + - https://github.com/bitnami/bitnami-docker-grafana + - https://grafana.com/ + type: application + urls: + - https://github.com/truecharts/apps/releases/download/grafana-2.0.16/grafana-2.0.16.tgz + version: 2.0.16 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -16973,6 +17066,40 @@ entries: - https://github.com/truecharts/apps/releases/download/medusa-1.0.24/medusa-1.0.24.tgz version: 1.0.24 memcached: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - database + - cache + truecharts.org/grade: U + apiVersion: v2 + appVersion: 1.6.12 + created: "2022-01-04T13:50:36.234769712Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + description: Memcached is a memory-backed database caching solution + digest: 2e6bb72c95c543ace2bfb2abf2c3c57338b2bb3f7ffd717fbb9c6d25f63a153f + home: https://github.com/truecharts/apps/tree/master/stable/memcached + icon: https://bitnami.com/assets/stacks/memcached/img/memcached-stack-220x234.png + keywords: + - memcached + - database + - cache + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: memcached + sources: + - https://github.com/bitnami/bitnami-docker-memcached + - http://memcached.org/ + type: application + urls: + - https://github.com/truecharts/apps/releases/download/memcached-1.0.44/memcached-1.0.44.tgz + version: 1.0.44 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -23478,6 +23605,37 @@ entries: - https://github.com/truecharts/apps/releases/download/phpldapadmin-4.0.20/phpldapadmin-4.0.20.tgz version: 4.0.20 piaware: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - media + truecharts.org/grade: U + apiVersion: v2 + appVersion: "6.1" + created: "2022-01-04T13:50:36.371557927Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + description: Program for forwarding ADS-B data to FlightAware + digest: 1445813e26d7854220449bb758037231806d9033173cc4bddf04ac15e4bd8cf2 + home: https://github.com/truechartsapps/tree/master/charts/stable/piaware + icon: https://truecharts.org/_static/img/appicons/piaware-icon.png + keywords: + - piaware + - flight-aware + - flight-tracker + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: piaware + sources: + - https://github.com/flightaware/piaware + urls: + - https://github.com/truecharts/apps/releases/download/piaware-4.0.36/piaware-4.0.36.tgz + version: 4.0.36 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -24541,6 +24699,39 @@ entries: - https://github.com/truecharts/apps/releases/download/podgrab-7.0.20/podgrab-7.0.20.tgz version: 7.0.20 postgresql: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - database + truecharts.org/grade: U + apiVersion: v2 + appVersion: 14.1.0 + created: "2022-01-04T13:50:36.517334789Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + description: PostgresSQL + digest: dbb9e54a949d530db4e7b1fb13e49a50d81796ae8a5c2c84b3f07ae04bdd303a + home: https://github.com/truecharts/apps/tree/master/stable/postgres + icon: https://d1q6f0aelx0por.cloudfront.net/product-logos/library-postgres-logo.png + keywords: + - postgres + - postgressql + - dtabase + - sql + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: postgresql + sources: + - https://www.postgresql.org/ + type: application + urls: + - https://github.com/truecharts/apps/releases/download/postgresql-6.0.42/postgresql-6.0.42.tgz + version: 6.0.42 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -25485,6 +25676,48 @@ entries: - https://github.com/truecharts/apps/releases/download/promcord-2.0.0/promcord-2.0.0.tgz version: 2.0.0 prometheus: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - metrics + truecharts.org/grade: U + apiVersion: v2 + appVersion: 0.53.1 + created: "2022-01-04T13:50:36.681298647Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + - condition: exporters.enabled,exporters.node-exporter.enabled + name: node-exporter + repository: https://charts.bitnami.com/bitnami + version: 2.3.17 + - condition: exporters.enabled,exporters.kube-state-metrics.enabled + name: kube-state-metrics + repository: https://charts.bitnami.com/bitnami + version: 2.1.19 + description: kube-prometheus-stack collects Kubernetes manifests, Grafana dashboards, + and Prometheus rules combined with documentation and scripts to provide easy + to operate end-to-end Kubernetes cluster monitoring with Prometheus using the + Prometheus Operator. + digest: ec712b89ed19685c286d36fdc502e566d5e3b0e03d677d8ae2945427acb3fd19 + home: https://github.com/truecharts/apps/tree/master/charts/stable/prometheus + icon: https://truecharts.org/_static/img/appicons/prometheus-icon.png + keywords: + - metrics + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: prometheus + sources: + - https://github.com/prometheus-community/helm-charts + - https://github.com/prometheus-operator/kube-prometheus + type: application + urls: + - https://github.com/truecharts/apps/releases/download/prometheus-1.1.34/prometheus-1.1.34.tgz + version: 1.1.34 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -27631,6 +27864,40 @@ entries: - https://github.com/truecharts/apps/releases/download/qbittorrent-9.0.24/qbittorrent-9.0.24.tgz version: 9.0.24 quassel-core: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - incubator + truecharts.org/grade: U + apiVersion: v2 + appVersion: 0.14.0 + created: "2022-01-04T13:50:36.85222654Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + - condition: postgresql.enabled + name: postgresql + repository: https://truecharts.org/ + version: 6.0.40 + description: Quassel-core is a modern, cross-platform, distributed IRC client. + digest: d2f9ac70c19cf32d4817e5dd4b20d2a55c6a35a3c7f183454b70c9ed828e227d + home: https://github.com/truecharts/apps/tree/master/charts/stable/quassel-core + icon: https://truecharts.org/_static/img/appicons/quassel-core-icon.png + keywords: + - quassel-core + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: quassel-core + sources: + - https://hub.docker.com/r/linuxserver/quassel-core + type: application + urls: + - https://github.com/truecharts/apps/releases/download/quassel-core-0.0.10/quassel-core-0.0.10.tgz + version: 0.0.10 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -27923,6 +28190,38 @@ entries: - https://github.com/truecharts/apps/releases/download/quassel-web-0.0.1/quassel-web-0.0.1.tgz version: 0.0.1 radarr: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - media + truecharts.org/grade: U + apiVersion: v2 + appVersion: 3.2.2.5080 + created: "2022-01-04T13:50:37.002250725Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + description: A fork of Sonarr to work with movies à la Couchpotato + digest: ecb59e2397da9d9652047d56dec2fd75c62531228234953ee335f88b5cd4690c + home: https://github.com/truecharts/apps/tree/master/charts/stable/radarr + icon: https://truecharts.org/_static/img/appicons/radarr-icon.png + keywords: + - radarr + - torrent + - usenet + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: radarr + sources: + - https://github.com/Radarr/Radarr + type: application + urls: + - https://github.com/truecharts/apps/releases/download/radarr-9.0.29/radarr-9.0.29.tgz + version: 9.0.29 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -28522,6 +28821,40 @@ entries: - https://github.com/truecharts/apps/releases/download/recipes-4.0.16/recipes-4.0.16.tgz version: 4.0.16 redis: + - annotations: + truecharts.org/SCALE-support: "true" + truecharts.org/catagories: | + - database + - cache + truecharts.org/grade: U + apiVersion: v2 + appVersion: 6.2.6 + created: "2022-01-04T13:50:37.153363115Z" + dependencies: + - name: common + repository: https://truecharts.org + version: 8.9.26 + description: Open source, advanced key-value store. + digest: 9868c5dac18ddd4e8b52d23b9332b9d88b5a8c97b537ff11b1582e07cd6734cb + home: https://github.com/truecharts/apps/tree/master/stable/redis + icon: https://bitnami.com/assets/stacks/redis/img/redis-stack-220x234.png + keywords: + - redis + - keyvalue + - database + kubeVersion: '>=1.16.0-0' + maintainers: + - email: info@truecharts.org + name: TrueCharts + url: https://truecharts.org + name: redis + sources: + - https://github.com/bitnami/bitnami-docker-redis + - http://redis.io/ + type: application + urls: + - https://github.com/truecharts/apps/releases/download/redis-1.0.47/redis-1.0.47.tgz + version: 1.0.47 - annotations: truecharts.org/SCALE-support: "true" truecharts.org/catagories: | @@ -36398,4 +36731,4 @@ entries: urls: - https://github.com/truecharts/apps/releases/download/zwavejs2mqtt-9.0.24/zwavejs2mqtt-9.0.24.tgz version: 9.0.24 -generated: "2022-01-03T21:51:44.758064836Z" +generated: "2022-01-04T13:50:37.15631083Z"