diff --git a/charts/core/prometheus/CHANGELOG.md b/charts/core/prometheus/CHANGELOG.md
index b5dc4594aeb..1476aca6f8a 100644
--- a/charts/core/prometheus/CHANGELOG.md
+++ b/charts/core/prometheus/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [prometheus-1.1.34](https://github.com/truecharts/apps/compare/prometheus-1.1.33...prometheus-1.1.34) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [prometheus-1.1.33](https://github.com/truecharts/apps/compare/prometheus-1.1.32...prometheus-1.1.33) (2022-01-03)
diff --git a/charts/core/prometheus/helm-values.md b/charts/core/prometheus/helm-values.md
index c5ab816547a..cf2ff37e110 100644
--- a/charts/core/prometheus/helm-values.md
+++ b/charts/core/prometheus/helm-values.md
@@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here
| alertmanager.volumeMounts | list | `[]` | |
| alertmanager.volumes | list | `[]` | |
| alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | |
-| alertmanagerImage.tag | string | `"v0.23.0@sha256:af7fd554b16af3da08ad586099580fbe3009f20e4645e2f3e777b47488e0864e"` | |
+| alertmanagerImage.tag | string | `"v0.23.0@sha256:7039c919e5ba9ae15ad762daea3e66de922dc644986efa888ff6b298645ee52f"` | |
| coreDns.enabled | bool | `true` | |
| coreDns.namespace | string | `"kube-system"` | |
| coreDns.service.enabled | bool | `true` | |
@@ -104,7 +104,7 @@ You will, however, be able to use all values referenced in the common chart here
| exporters.node-exporter.enabled | bool | `true` | |
| global.labels | object | `{}` | |
| image.repository | string | `"tccr.io/truecharts/prometheus-operator"` | |
-| image.tag | string | `"v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311"` | |
+| image.tag | string | `"v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7"` | |
| ingress.alertmanager.enabled | bool | `false` | |
| ingress.main.enabled | bool | `false` | |
| ingress.thanos.enabled | bool | `false` | |
@@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here
| prometheus.volumes | list | `[]` | |
| prometheus.walCompression | bool | `false` | |
| prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | |
-| prometheusImage.tag | string | `"v2.32.1@sha256:590ea3b1f942eaa4936306e4d7ca125455884bddbdac9012881f527818bdf3fe"` | |
+| prometheusImage.tag | string | `"v2.32.1@sha256:38751ed343cd65026bf268e7040619fde670214f14ca092d914cf836595ab740"` | |
| rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| service.alertmanager.enabled | bool | `true` | |
diff --git a/charts/core/prometheus/security.md b/charts/core/prometheus/security.md
index adc821a1032..61a13d30df6 100644
--- a/charts/core/prometheus/security.md
+++ b/charts/core/prometheus/security.md
@@ -168,7 +168,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311
+ tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7
bitnami/node-exporter:1.3.1-debian-10-r0
bitnami/kube-state-metrics:2.3.0-debian-10-r0
@@ -207,7 +207,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311 (debian 10.11)
+#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7 (debian 10.11)
**debian**
diff --git a/charts/dependency/memcached/CHANGELOG.md b/charts/dependency/memcached/CHANGELOG.md
index 144073608c2..bdd958a3df6 100644
--- a/charts/dependency/memcached/CHANGELOG.md
+++ b/charts/dependency/memcached/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [memcached-1.0.44](https://github.com/truecharts/apps/compare/memcached-1.0.43...memcached-1.0.44) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [memcached-1.0.43](https://github.com/truecharts/apps/compare/memcached-1.0.42...memcached-1.0.43) (2022-01-03)
diff --git a/charts/dependency/memcached/helm-values.md b/charts/dependency/memcached/helm-values.md
index 08dc293ab0e..2d1cb89723f 100644
--- a/charts/dependency/memcached/helm-values.md
+++ b/charts/dependency/memcached/helm-values.md
@@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here
|-----|------|---------|-------------|
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/memcached"` | |
-| image.tag | string | `"v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126"` | |
+| image.tag | string | `"v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926"` | |
| service.main.ports.main.port | int | `11211` | |
| service.main.ports.main.targetPort | int | `11211` | |
diff --git a/charts/dependency/memcached/security.md b/charts/dependency/memcached/security.md
index 1189525f73c..51ffeccd078 100644
--- a/charts/dependency/memcached/security.md
+++ b/charts/dependency/memcached/security.md
@@ -31,7 +31,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126
+ tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926
##### Scan Results
@@ -68,7 +68,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126 (debian 10.11)
+#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926 (debian 10.11)
**debian**
diff --git a/charts/dependency/postgresql/CHANGELOG.md b/charts/dependency/postgresql/CHANGELOG.md
index d1083084907..abb23455b14 100644
--- a/charts/dependency/postgresql/CHANGELOG.md
+++ b/charts/dependency/postgresql/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [postgresql-6.0.42](https://github.com/truecharts/apps/compare/postgresql-6.0.41...postgresql-6.0.42) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [postgresql-6.0.41](https://github.com/truecharts/apps/compare/postgresql-6.0.40...postgresql-6.0.41) (2022-01-03)
diff --git a/charts/dependency/postgresql/helm-values.md b/charts/dependency/postgresql/helm-values.md
index 7f1c293ce70..1b848559681 100644
--- a/charts/dependency/postgresql/helm-values.md
+++ b/charts/dependency/postgresql/helm-values.md
@@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here
| existingSecret | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/postgresql"` | |
-| image.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | |
+| image.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| postgrespassword | string | `"testroot"` | |
| postgresqlDatabase | string | `"test"` | |
diff --git a/charts/dependency/postgresql/security.md b/charts/dependency/postgresql/security.md
index 7b052d5358d..b736b9d0275 100644
--- a/charts/dependency/postgresql/security.md
+++ b/charts/dependency/postgresql/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31
+ tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31 (debian 10.11)
+#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686 (debian 10.11)
**debian**
diff --git a/charts/dependency/redis/CHANGELOG.md b/charts/dependency/redis/CHANGELOG.md
index eb4b3a9c152..1f0c4247f07 100644
--- a/charts/dependency/redis/CHANGELOG.md
+++ b/charts/dependency/redis/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [redis-1.0.47](https://github.com/truecharts/apps/compare/redis-1.0.46...redis-1.0.47) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [redis-1.0.46](https://github.com/truecharts/apps/compare/redis-1.0.45...redis-1.0.46) (2022-01-03)
diff --git a/charts/dependency/redis/helm-values.md b/charts/dependency/redis/helm-values.md
index ef6a8a5344b..c2469731851 100644
--- a/charts/dependency/redis/helm-values.md
+++ b/charts/dependency/redis/helm-values.md
@@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here
| existingSecret | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/redis"` | |
-| image.tag | string | `"v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797"` | |
+| image.tag | string | `"v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb"` | |
| persistence.redis-health | object | See below | redis-health configmap mount |
| persistence.redis-health.mountPath | string | `"/health"` | Where to mount the volume in the main container. Defaults to `/`, setting to '-' creates the volume but disables the volumeMount. |
| persistence.redis-health.readOnly | bool | `false` | Specify if the volume should be mounted read-only. |
diff --git a/charts/dependency/redis/security.md b/charts/dependency/redis/security.md
index 2cdf01ec08a..593dcaad6b9 100644
--- a/charts/dependency/redis/security.md
+++ b/charts/dependency/redis/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797
+ tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797 (debian 10.11)
+#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb (debian 10.11)
**debian**
diff --git a/charts/library/common/CHANGELOG.md b/charts/library/common/CHANGELOG.md
index 338b6a82c66..b3fb83be73e 100644
--- a/charts/library/common/CHANGELOG.md
+++ b/charts/library/common/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [common-8.10.2](https://github.com/truecharts/apps/compare/common-8.10.1...common-8.10.2) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [common-8.10.1](https://github.com/truecharts/apps/compare/common-8.10.0...common-8.10.1) (2022-01-03)
diff --git a/charts/library/common/helm-values.md b/charts/library/common/helm-values.md
index 76751e63b38..bb670bac532 100644
--- a/charts/library/common/helm-values.md
+++ b/charts/library/common/helm-values.md
@@ -183,7 +183,7 @@ This chart is used by a lot of our Apps to provide sane defaults and logic.
| postgresqlImage | object | See below | postgresql specific configuration |
| postgresqlImage.pullPolicy | string | `"IfNotPresent"` | Specify the postgresql image pull policy |
| postgresqlImage.repository | string | `"ghcr.io/truecharts/postgresql"` | Specify the postgresql image |
-| postgresqlImage.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | Specify the postgresql image tag |
+| postgresqlImage.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | Specify the postgresql image tag |
| priorityClassName | string | `nil` | |
| probes | object | See below | Probe configuration -- [[ref]](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/) |
| probes.liveness | object | See below | Liveness probe configuration |
diff --git a/charts/stable/appdaemon/CHANGELOG.md b/charts/stable/appdaemon/CHANGELOG.md
index d7ce246f14c..7eba8353afb 100644
--- a/charts/stable/appdaemon/CHANGELOG.md
+++ b/charts/stable/appdaemon/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [appdaemon-7.0.9](https://github.com/truecharts/apps/compare/appdaemon-7.0.8...appdaemon-7.0.9) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [appdaemon-7.0.8](https://github.com/truecharts/apps/compare/appdaemon-7.0.7...appdaemon-7.0.8) (2021-12-28)
diff --git a/charts/stable/appdaemon/Chart.yaml b/charts/stable/appdaemon/Chart.yaml
index df23a40f8e2..a178671e0d1 100644
--- a/charts/stable/appdaemon/Chart.yaml
+++ b/charts/stable/appdaemon/Chart.yaml
@@ -1,5 +1,5 @@
apiVersion: v2
-appVersion: "4.1.0"
+appVersion: "4.2.0"
dependencies:
- name: common
repository: https://truecharts.org
diff --git a/charts/stable/appdaemon/helm-values.md b/charts/stable/appdaemon/helm-values.md
index 2bc4ebb02b3..de528094bda 100644
--- a/charts/stable/appdaemon/helm-values.md
+++ b/charts/stable/appdaemon/helm-values.md
@@ -18,7 +18,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.TZ | string | `"America/Chicago"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/appdaemon"` | |
-| image.tag | string | `"v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6"` | |
+| image.tag | string | `"v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5"` | |
| persistence.conf.enabled | bool | `true` | |
| persistence.conf.mountPath | string | `"/conf"` | |
| persistence.varrun.enabled | bool | `true` | |
diff --git a/charts/stable/appdaemon/security.md b/charts/stable/appdaemon/security.md
index ad7f736a8e2..63128798fe9 100644
--- a/charts/stable/appdaemon/security.md
+++ b/charts/stable/appdaemon/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6
+ tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5
##### Scan Results
@@ -69,76 +69,20 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6 (alpine 3.14.1)
+#### Container: tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5 (alpine 3.15.0)
**alpine**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libuuid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 | Expand...
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
|
-| openssl-dev | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| openssl-dev | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
+| No Vulnerabilities found |
+|:---------------------------------|
+
+
**python-pkg**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| aiohttp | pyup.io-42692 | UNKNOWN | 3.7.4.post0 | 3.8.0 | Expand...
|
-
-**cargo**
-
-
-| No Vulnerabilities found |
-|:---------------------------------|
-
-
-
-**cargo**
-
-
-| No Vulnerabilities found |
-|:---------------------------------|
-
-
-
-**cargo**
-
-
| No Vulnerabilities found |
|:---------------------------------|
@@ -151,36 +95,25 @@ hide:
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| chrono | RUSTSEC-2020-0159 | UNKNOWN | 0.4.19 | | Expand...
https://github.com/chronotope/chrono/issues/499
|
| cpuid-bool | RUSTSEC-2021-0064 | UNKNOWN | 0.1.2 | | Expand...
https://github.com/RustCrypto/utils/pull/381
|
-| crossbeam-deque | RUSTSEC-2021-0093 | UNKNOWN | 0.7.3 | >= 0.7.4, < 0.8.0, >= 0.8.1 | Expand...
https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
|
| difference | RUSTSEC-2020-0095 | UNKNOWN | 2.0.0 | | Expand...
https://github.com/johannhof/difference.rs/issues/45
|
-| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.1 | | Expand...
https://github.com/dirs-dev/directories-rs
|
+| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.2 | | Expand...
https://github.com/dirs-dev/directories-rs
|
| dirs | RUSTSEC-2020-0053 | UNKNOWN | 2.0.2 | | Expand...
https://github.com/dirs-dev/dirs-rs
|
| lock_api | RUSTSEC-2020-0070 | UNKNOWN | 0.4.1 | >= 0.4.2 | Expand...
https://github.com/Amanieu/parking_lot/pull/262
|
-| memmap | RUSTSEC-2020-0077 | UNKNOWN | 0.7.0 | | Expand...
https://github.com/danburkert/memmap-rs/issues/90
|
-| net2 | RUSTSEC-2020-0016 | UNKNOWN | 0.2.36 | | Expand...
https://github.com/deprecrated/net2-rs/commit/3350e3819adf151709047e93f25583a5df681091
|
-| openssl-src | RUSTSEC-2021-0055 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 | Expand...
https://www.openssl.org/news/secadv/20210325.txt
|
-| openssl-src | RUSTSEC-2021-0056 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 | Expand...
https://www.openssl.org/news/secadv/20210325.txt
|
-| openssl-src | RUSTSEC-2021-0057 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 | Expand...
https://www.openssl.org/news/secadv/20210216.txt
|
-| openssl-src | RUSTSEC-2021-0058 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 | Expand...
https://www.openssl.org/news/secadv/20210216.txt
|
-| openssl-src | RUSTSEC-2021-0097 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 | Expand...
https://www.openssl.org/news/secadv/20210824.txt
|
-| openssl-src | RUSTSEC-2021-0098 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 | Expand...
https://www.openssl.org/news/secadv/20210824.txt
|
-| tar | RUSTSEC-2021-0080 | UNKNOWN | 0.4.29 | >= 0.4.36 | Expand...
https://github.com/alexcrichton/tar-rs/issues/238
|
-| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | | Expand...
https://github.com/Stebalien/term/issues/93
|
| term | RUSTSEC-2018-0015 | UNKNOWN | 0.6.1 | | Expand...
https://github.com/Stebalien/term/issues/93
|
| time | RUSTSEC-2020-0071 | UNKNOWN | 0.1.43 | >= 0.2.23 | Expand...
https://github.com/time-rs/time/issues/293
|
-| tokio | RUSTSEC-2021-0124 | UNKNOWN | 0.2.24 | >= 1.8.4, < 1.9.0, >= 1.13.1 | Expand...
https://github.com/tokio-rs/tokio/issues/4225
|
+| tokio | RUSTSEC-2021-0124 | UNKNOWN | 1.8.2 | >= 1.8.4, < 1.9.0, >= 1.13.1 | Expand...
https://github.com/tokio-rs/tokio/issues/4225
|
| yaml-rust | RUSTSEC-2018-0006 | UNKNOWN | 0.3.5 | >= 0.4.1 | Expand...
https://github.com/chyh1990/yaml-rust/pull/109
|
**cargo**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| cranelift-codegen | RUSTSEC-2021-0067 | UNKNOWN | 0.70.0 | >= 0.73.1 | Expand...
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5
|
+| No Vulnerabilities found |
+|:---------------------------------|
+
+
**cargo**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | | Expand...
https://github.com/Stebalien/term/issues/93
|
+| No Vulnerabilities found |
+|:---------------------------------|
diff --git a/charts/stable/grafana/CHANGELOG.md b/charts/stable/grafana/CHANGELOG.md
index c73eb6b739c..94c688108c1 100644
--- a/charts/stable/grafana/CHANGELOG.md
+++ b/charts/stable/grafana/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [grafana-2.0.16](https://github.com/truecharts/apps/compare/grafana-2.0.15...grafana-2.0.16) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [grafana-2.0.15](https://github.com/truecharts/apps/compare/grafana-2.0.14...grafana-2.0.15) (2022-01-03)
diff --git a/charts/stable/grafana/helm-values.md b/charts/stable/grafana/helm-values.md
index 1338271b51a..adf4db0b776 100644
--- a/charts/stable/grafana/helm-values.md
+++ b/charts/stable/grafana/helm-values.md
@@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.GF_PATHS_PROVISIONING | string | `"/opt/bitnami/grafana/conf/provisioning"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/grafana"` | |
-| image.tag | string | `"v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26"` | |
+| image.tag | string | `"v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f"` | |
| metrics.enabled | bool | See values.yaml | Enable and configure a Prometheus serviceMonitor for the chart under this key. |
| metrics.prometheusRule | object | See values.yaml | Enable and configure Prometheus Rules for the chart under this key. |
| metrics.prometheusRule.rules | list | See prometheusrules.yaml | Configure additionial rules for the chart under this key. |
diff --git a/charts/stable/grafana/security.md b/charts/stable/grafana/security.md
index f8a7c028664..7d78366ae08 100644
--- a/charts/stable/grafana/security.md
+++ b/charts/stable/grafana/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26
+ tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26 (debian 10.11)
+#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f (debian 10.11)
**debian**
diff --git a/charts/stable/piaware/CHANGELOG.md b/charts/stable/piaware/CHANGELOG.md
index ff604b359a5..1bdf8220c61 100644
--- a/charts/stable/piaware/CHANGELOG.md
+++ b/charts/stable/piaware/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [piaware-4.0.36](https://github.com/truecharts/apps/compare/piaware-4.0.35...piaware-4.0.36) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [piaware-4.0.35](https://github.com/truecharts/apps/compare/piaware-4.0.34...piaware-4.0.35) (2022-01-03)
diff --git a/charts/stable/piaware/helm-values.md b/charts/stable/piaware/helm-values.md
index 46dfd400955..ed8a3b16373 100644
--- a/charts/stable/piaware/helm-values.md
+++ b/charts/stable/piaware/helm-values.md
@@ -16,7 +16,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.TZ | string | `"UTC"` | Set the container timezone |
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
| image.repository | string | `"tccr.io/truecharts/piaware"` | image repository |
-| image.tag | string | `"v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e"` | image tag |
+| image.tag | string | `"v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c"` | image tag |
| persistence | object | See values.yaml | Configure persistence settings for the chart under this key. |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
diff --git a/charts/stable/piaware/security.md b/charts/stable/piaware/security.md
index 7ab8397ee2d..798aa48e108 100644
--- a/charts/stable/piaware/security.md
+++ b/charts/stable/piaware/security.md
@@ -33,7 +33,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e
+ tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c
##### Scan Results
@@ -70,7 +70,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e (debian 10.11)
+#### Container: tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c (debian 10.11)
**debian**
diff --git a/charts/stable/quassel-core/CHANGELOG.md b/charts/stable/quassel-core/CHANGELOG.md
index 12ffacef66b..6b4230130e9 100644
--- a/charts/stable/quassel-core/CHANGELOG.md
+++ b/charts/stable/quassel-core/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [quassel-core-0.0.10](https://github.com/truecharts/apps/compare/quassel-core-0.0.9...quassel-core-0.0.10) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [quassel-core-0.0.9](https://github.com/truecharts/apps/compare/quassel-core-0.0.8...quassel-core-0.0.9) (2021-12-28)
diff --git a/charts/stable/quassel-core/Chart.yaml b/charts/stable/quassel-core/Chart.yaml
index 8234189d577..beff255c5a5 100644
--- a/charts/stable/quassel-core/Chart.yaml
+++ b/charts/stable/quassel-core/Chart.yaml
@@ -2,7 +2,7 @@ apiVersion: v2
kubeVersion: ">=1.16.0-0"
name: quassel-core
version: 0.0.10
-appVersion: "0.13.1"
+appVersion: "0.14.0"
description: Quassel-core is a modern, cross-platform, distributed IRC client.
type: application
deprecated: false
diff --git a/charts/stable/quassel-core/helm-values.md b/charts/stable/quassel-core/helm-values.md
index 64ba6a657f9..2b5550074ae 100644
--- a/charts/stable/quassel-core/helm-values.md
+++ b/charts/stable/quassel-core/helm-values.md
@@ -23,7 +23,7 @@ You will, however, be able to use all values referenced in the common chart here
| envValueFrom.DB_PGSQL_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/quassel-core"` | |
-| image.tag | string | `"v0.13.1"` | |
+| image.tag | string | `"v0.14.0"` | |
| persistence.varrun.enabled | bool | `true` | |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
diff --git a/charts/stable/quassel-core/security.md b/charts/stable/quassel-core/security.md
index 5ee282e69c5..b01e2b37ce0 100644
--- a/charts/stable/quassel-core/security.md
+++ b/charts/stable/quassel-core/security.md
@@ -52,7 +52,7 @@ hide:
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
tccr.io/truecharts/postgresql:v14.1.0@sha256:d1849137d3b53f5b5155d2a8d47fe0129b215d0c5b53a87096423f5c4feaf0e1
- tccr.io/truecharts/quassel-core:v0.13.1
+ tccr.io/truecharts/quassel-core:v0.14.0
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
tccr.io/truecharts/postgresql:v14.1.0@sha256:f734751e367098b427baba1abec9728700f92e89d5dd370ae43910d7f2814b97
diff --git a/charts/stable/radarr/CHANGELOG.md b/charts/stable/radarr/CHANGELOG.md
index 52492440898..5328c3d1904 100644
--- a/charts/stable/radarr/CHANGELOG.md
+++ b/charts/stable/radarr/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [radarr-9.0.29](https://github.com/truecharts/apps/compare/radarr-9.0.28...radarr-9.0.29) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [radarr-9.0.28](https://github.com/truecharts/apps/compare/radarr-9.0.27...radarr-9.0.28) (2021-12-28)
diff --git a/charts/stable/radarr/helm-values.md b/charts/stable/radarr/helm-values.md
index cc8fe713f7b..35a664dccc0 100644
--- a/charts/stable/radarr/helm-values.md
+++ b/charts/stable/radarr/helm-values.md
@@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
| env | object | `{}` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/radarr"` | |
-| image.tag | string | `"v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f"` | |
+| image.tag | string | `"v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86"` | |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/config"` | |
| probes.liveness.custom | bool | `true` | |
diff --git a/charts/stable/radarr/security.md b/charts/stable/radarr/security.md
index 14b1de60a44..08a52301f0f 100644
--- a/charts/stable/radarr/security.md
+++ b/charts/stable/radarr/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f
+ tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f (ubuntu 20.04)
+#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86 (ubuntu 20.04)
**ubuntu**
diff --git a/docs/apps/common/helm-values.md b/docs/apps/common/helm-values.md
index 76751e63b38..bb670bac532 100644
--- a/docs/apps/common/helm-values.md
+++ b/docs/apps/common/helm-values.md
@@ -183,7 +183,7 @@ This chart is used by a lot of our Apps to provide sane defaults and logic.
| postgresqlImage | object | See below | postgresql specific configuration |
| postgresqlImage.pullPolicy | string | `"IfNotPresent"` | Specify the postgresql image pull policy |
| postgresqlImage.repository | string | `"ghcr.io/truecharts/postgresql"` | Specify the postgresql image |
-| postgresqlImage.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | Specify the postgresql image tag |
+| postgresqlImage.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | Specify the postgresql image tag |
| priorityClassName | string | `nil` | |
| probes | object | See below | Probe configuration -- [[ref]](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/) |
| probes.liveness | object | See below | Liveness probe configuration |
diff --git a/docs/apps/core/prometheus/CHANGELOG.md b/docs/apps/core/prometheus/CHANGELOG.md
index b5dc4594aeb..1476aca6f8a 100644
--- a/docs/apps/core/prometheus/CHANGELOG.md
+++ b/docs/apps/core/prometheus/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [prometheus-1.1.34](https://github.com/truecharts/apps/compare/prometheus-1.1.33...prometheus-1.1.34) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [prometheus-1.1.33](https://github.com/truecharts/apps/compare/prometheus-1.1.32...prometheus-1.1.33) (2022-01-03)
diff --git a/docs/apps/core/prometheus/helm-values.md b/docs/apps/core/prometheus/helm-values.md
index c5ab816547a..cf2ff37e110 100644
--- a/docs/apps/core/prometheus/helm-values.md
+++ b/docs/apps/core/prometheus/helm-values.md
@@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here
| alertmanager.volumeMounts | list | `[]` | |
| alertmanager.volumes | list | `[]` | |
| alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | |
-| alertmanagerImage.tag | string | `"v0.23.0@sha256:af7fd554b16af3da08ad586099580fbe3009f20e4645e2f3e777b47488e0864e"` | |
+| alertmanagerImage.tag | string | `"v0.23.0@sha256:7039c919e5ba9ae15ad762daea3e66de922dc644986efa888ff6b298645ee52f"` | |
| coreDns.enabled | bool | `true` | |
| coreDns.namespace | string | `"kube-system"` | |
| coreDns.service.enabled | bool | `true` | |
@@ -104,7 +104,7 @@ You will, however, be able to use all values referenced in the common chart here
| exporters.node-exporter.enabled | bool | `true` | |
| global.labels | object | `{}` | |
| image.repository | string | `"tccr.io/truecharts/prometheus-operator"` | |
-| image.tag | string | `"v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311"` | |
+| image.tag | string | `"v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7"` | |
| ingress.alertmanager.enabled | bool | `false` | |
| ingress.main.enabled | bool | `false` | |
| ingress.thanos.enabled | bool | `false` | |
@@ -317,7 +317,7 @@ You will, however, be able to use all values referenced in the common chart here
| prometheus.volumes | list | `[]` | |
| prometheus.walCompression | bool | `false` | |
| prometheusImage.repository | string | `"tccr.io/truecharts/prometheus"` | |
-| prometheusImage.tag | string | `"v2.32.1@sha256:590ea3b1f942eaa4936306e4d7ca125455884bddbdac9012881f527818bdf3fe"` | |
+| prometheusImage.tag | string | `"v2.32.1@sha256:38751ed343cd65026bf268e7040619fde670214f14ca092d914cf836595ab740"` | |
| rbac | object | `{"enabled":true,"rules":[{"apiGroups":["apiextensions.k8s.io"],"resources":["customresourcedefinitions"],"verbs":["create"]},{"apiGroups":["apiextensions.k8s.io"],"resourceNames":["alertmanagers.monitoring.coreos.com","podmonitors.monitoring.coreos.com","prometheuses.monitoring.coreos.com","prometheusrules.monitoring.coreos.com","servicemonitors.monitoring.coreos.com","thanosrulers.monitoring.coreos.com","probes.monitoring.coreos.com"],"resources":["customresourcedefinitions"],"verbs":["get","update"]},{"apiGroups":["monitoring.coreos.com"],"resources":["alertmanagers","alertmanagers/finalizers","alertmanagerconfigs","prometheuses","prometheuses/finalizers","thanosrulers","thanosrulers/finalizers","servicemonitors","podmonitors","probes","prometheusrules"],"verbs":["*"]},{"apiGroups":["apps"],"resources":["statefulsets"],"verbs":["*"]},{"apiGroups":[""],"resources":["configmaps","secrets"],"verbs":["*"]},{"apiGroups":[""],"resources":["pods"],"verbs":["list","delete"]},{"apiGroups":[""],"resources":["services","services/finalizers","endpoints"],"verbs":["get","create","update","delete"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["list","watch"]},{"apiGroups":[""],"resources":["namespaces"],"verbs":["get","list","watch"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","list","watch"]}]}` | Whether Role Based Access Control objects like roles and rolebindings should be created |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| service.alertmanager.enabled | bool | `true` | |
diff --git a/docs/apps/core/prometheus/security.md b/docs/apps/core/prometheus/security.md
index adc821a1032..61a13d30df6 100644
--- a/docs/apps/core/prometheus/security.md
+++ b/docs/apps/core/prometheus/security.md
@@ -168,7 +168,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311
+ tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7
bitnami/node-exporter:1.3.1-debian-10-r0
bitnami/kube-state-metrics:2.3.0-debian-10-r0
@@ -207,7 +207,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:26ac5a91fdc52a49e04b5ee63b6ff6550df933f861414cfa11e4e7b45e66c311 (debian 10.11)
+#### Container: tccr.io/truecharts/prometheus-operator:v0.53.1@sha256:544c374aff1ba203b78fc7e7c400fb7cc373b4400ca4df1a1b078026059341d7 (debian 10.11)
**debian**
diff --git a/docs/apps/dependency/memcached/CHANGELOG.md b/docs/apps/dependency/memcached/CHANGELOG.md
index 144073608c2..bdd958a3df6 100644
--- a/docs/apps/dependency/memcached/CHANGELOG.md
+++ b/docs/apps/dependency/memcached/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [memcached-1.0.44](https://github.com/truecharts/apps/compare/memcached-1.0.43...memcached-1.0.44) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [memcached-1.0.43](https://github.com/truecharts/apps/compare/memcached-1.0.42...memcached-1.0.43) (2022-01-03)
diff --git a/docs/apps/dependency/memcached/helm-values.md b/docs/apps/dependency/memcached/helm-values.md
index 08dc293ab0e..2d1cb89723f 100644
--- a/docs/apps/dependency/memcached/helm-values.md
+++ b/docs/apps/dependency/memcached/helm-values.md
@@ -13,7 +13,7 @@ You will, however, be able to use all values referenced in the common chart here
|-----|------|---------|-------------|
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/memcached"` | |
-| image.tag | string | `"v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126"` | |
+| image.tag | string | `"v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926"` | |
| service.main.ports.main.port | int | `11211` | |
| service.main.ports.main.targetPort | int | `11211` | |
diff --git a/docs/apps/dependency/memcached/security.md b/docs/apps/dependency/memcached/security.md
index 1189525f73c..51ffeccd078 100644
--- a/docs/apps/dependency/memcached/security.md
+++ b/docs/apps/dependency/memcached/security.md
@@ -31,7 +31,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126
+ tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926
##### Scan Results
@@ -68,7 +68,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:71f4e7a02c65cb547687b473b978206ea1202b3d11768cfb89ca8c302142f126 (debian 10.11)
+#### Container: tccr.io/truecharts/memcached:v1.6.12@sha256:a032bd4428ea81a37a901fa3ce196925f9c91f5d04faef603ca83905428c9926 (debian 10.11)
**debian**
diff --git a/docs/apps/dependency/postgresql/CHANGELOG.md b/docs/apps/dependency/postgresql/CHANGELOG.md
index d1083084907..abb23455b14 100644
--- a/docs/apps/dependency/postgresql/CHANGELOG.md
+++ b/docs/apps/dependency/postgresql/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [postgresql-6.0.42](https://github.com/truecharts/apps/compare/postgresql-6.0.41...postgresql-6.0.42) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [postgresql-6.0.41](https://github.com/truecharts/apps/compare/postgresql-6.0.40...postgresql-6.0.41) (2022-01-03)
diff --git a/docs/apps/dependency/postgresql/helm-values.md b/docs/apps/dependency/postgresql/helm-values.md
index 7f1c293ce70..1b848559681 100644
--- a/docs/apps/dependency/postgresql/helm-values.md
+++ b/docs/apps/dependency/postgresql/helm-values.md
@@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here
| existingSecret | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/postgresql"` | |
-| image.tag | string | `"v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31"` | |
+| image.tag | string | `"v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686"` | |
| podSecurityContext.runAsGroup | int | `0` | |
| postgrespassword | string | `"testroot"` | |
| postgresqlDatabase | string | `"test"` | |
diff --git a/docs/apps/dependency/postgresql/security.md b/docs/apps/dependency/postgresql/security.md
index 7b052d5358d..b736b9d0275 100644
--- a/docs/apps/dependency/postgresql/security.md
+++ b/docs/apps/dependency/postgresql/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31
+ tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:c1a73e5ace34ce1f7031bce96b10c098fa26e6bf218f3813128018e5c26deb31 (debian 10.11)
+#### Container: tccr.io/truecharts/postgresql:v14.1.0@sha256:43f930e836abc26019e9638e275d47ab3eb48acb289036cbf378cc4e36e5d686 (debian 10.11)
**debian**
diff --git a/docs/apps/dependency/redis/CHANGELOG.md b/docs/apps/dependency/redis/CHANGELOG.md
index eb4b3a9c152..1f0c4247f07 100644
--- a/docs/apps/dependency/redis/CHANGELOG.md
+++ b/docs/apps/dependency/redis/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [redis-1.0.47](https://github.com/truecharts/apps/compare/redis-1.0.46...redis-1.0.47) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [redis-1.0.46](https://github.com/truecharts/apps/compare/redis-1.0.45...redis-1.0.46) (2022-01-03)
diff --git a/docs/apps/dependency/redis/helm-values.md b/docs/apps/dependency/redis/helm-values.md
index ef6a8a5344b..c2469731851 100644
--- a/docs/apps/dependency/redis/helm-values.md
+++ b/docs/apps/dependency/redis/helm-values.md
@@ -28,7 +28,7 @@ You will, however, be able to use all values referenced in the common chart here
| existingSecret | string | `""` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"ghcr.io/truecharts/redis"` | |
-| image.tag | string | `"v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797"` | |
+| image.tag | string | `"v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb"` | |
| persistence.redis-health | object | See below | redis-health configmap mount |
| persistence.redis-health.mountPath | string | `"/health"` | Where to mount the volume in the main container. Defaults to `/`, setting to '-' creates the volume but disables the volumeMount. |
| persistence.redis-health.readOnly | bool | `false` | Specify if the volume should be mounted read-only. |
diff --git a/docs/apps/dependency/redis/security.md b/docs/apps/dependency/redis/security.md
index 2cdf01ec08a..593dcaad6b9 100644
--- a/docs/apps/dependency/redis/security.md
+++ b/docs/apps/dependency/redis/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797
+ tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:43a0eb554acdf63d035eda1cc5b19d3a5565eff0d50ac1f8447239058002a797 (debian 10.11)
+#### Container: tccr.io/truecharts/redis:v6.2.6@sha256:a021aec3adf6b103916f5af0dfcc3eeb267ac3cbf802689614d4b025206fcfbb (debian 10.11)
**debian**
diff --git a/docs/apps/stable/appdaemon/CHANGELOG.md b/docs/apps/stable/appdaemon/CHANGELOG.md
index d7ce246f14c..7eba8353afb 100644
--- a/docs/apps/stable/appdaemon/CHANGELOG.md
+++ b/docs/apps/stable/appdaemon/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [appdaemon-7.0.9](https://github.com/truecharts/apps/compare/appdaemon-7.0.8...appdaemon-7.0.9) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [appdaemon-7.0.8](https://github.com/truecharts/apps/compare/appdaemon-7.0.7...appdaemon-7.0.8) (2021-12-28)
diff --git a/docs/apps/stable/appdaemon/helm-values.md b/docs/apps/stable/appdaemon/helm-values.md
index 2bc4ebb02b3..de528094bda 100644
--- a/docs/apps/stable/appdaemon/helm-values.md
+++ b/docs/apps/stable/appdaemon/helm-values.md
@@ -18,7 +18,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.TZ | string | `"America/Chicago"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/appdaemon"` | |
-| image.tag | string | `"v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6"` | |
+| image.tag | string | `"v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5"` | |
| persistence.conf.enabled | bool | `true` | |
| persistence.conf.mountPath | string | `"/conf"` | |
| persistence.varrun.enabled | bool | `true` | |
diff --git a/docs/apps/stable/appdaemon/security.md b/docs/apps/stable/appdaemon/security.md
index ad7f736a8e2..63128798fe9 100644
--- a/docs/apps/stable/appdaemon/security.md
+++ b/docs/apps/stable/appdaemon/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6
+ tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5
##### Scan Results
@@ -69,76 +69,20 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/appdaemon:v4.1.0@sha256:f490c318750595459824cb9355b95c8cdab768271288477454b212a8a93499a6 (alpine 3.14.1)
+#### Container: tccr.io/truecharts/appdaemon:v4.2.0@sha256:c3caaa7d7e2065cdfed6ccacf0998459e971054c1aeaf86725a62aa6aea61fd5 (alpine 3.15.0)
**alpine**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-| busybox | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| busybox | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-| curl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| curl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| curl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libcrypto1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libcrypto1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libcurl | CVE-2021-22945 | CRITICAL | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22945.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
https://hackerone.com/reports/1269242
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libcurl | CVE-2021-22946 | HIGH | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libcurl | CVE-2021-22947 | MEDIUM | 7.78.0-r0 | 7.79.0-r0 | Expand...
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://security.netapp.com/advisory/ntap-20211029-0003/
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuoct2021.html
|
-| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libssl1.1 | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| libuuid | CVE-2021-37600 | MEDIUM | 2.37-r0 | 2.37.2-r0 | Expand...
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://security.netapp.com/advisory/ntap-20210902-0002/
|
-| openssl-dev | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| openssl-dev | CVE-2021-3712 | HIGH | 1.1.1k-r0 | 1.1.1l-r0 | Expand...
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2021-9632.html
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
|
-| ssl_client | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42378
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42379 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42379
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42380 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42380
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42381 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42381
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42382 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42382
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42383 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-| ssl_client | CVE-2021-42384 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42384
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42385 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42385
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42386 | HIGH | 1.33.1-r3 | 1.33.1-r6 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42386
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42374 | MEDIUM | 1.33.1-r3 | 1.33.1-r4 | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42374
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
https://ubuntu.com/security/notices/USN-5179-1
|
-| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
+| No Vulnerabilities found |
+|:---------------------------------|
+
+
**python-pkg**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| aiohttp | pyup.io-42692 | UNKNOWN | 3.7.4.post0 | 3.8.0 | Expand...
|
-
-**cargo**
-
-
-| No Vulnerabilities found |
-|:---------------------------------|
-
-
-
-**cargo**
-
-
-| No Vulnerabilities found |
-|:---------------------------------|
-
-
-
-**cargo**
-
-
| No Vulnerabilities found |
|:---------------------------------|
@@ -151,36 +95,25 @@ hide:
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
| chrono | RUSTSEC-2020-0159 | UNKNOWN | 0.4.19 | | Expand...
https://github.com/chronotope/chrono/issues/499
|
| cpuid-bool | RUSTSEC-2021-0064 | UNKNOWN | 0.1.2 | | Expand...
https://github.com/RustCrypto/utils/pull/381
|
-| crossbeam-deque | RUSTSEC-2021-0093 | UNKNOWN | 0.7.3 | >= 0.7.4, < 0.8.0, >= 0.8.1 | Expand...
https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
|
| difference | RUSTSEC-2020-0095 | UNKNOWN | 2.0.0 | | Expand...
https://github.com/johannhof/difference.rs/issues/45
|
-| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.1 | | Expand...
https://github.com/dirs-dev/directories-rs
|
+| directories | RUSTSEC-2020-0054 | UNKNOWN | 3.0.2 | | Expand...
https://github.com/dirs-dev/directories-rs
|
| dirs | RUSTSEC-2020-0053 | UNKNOWN | 2.0.2 | | Expand...
https://github.com/dirs-dev/dirs-rs
|
| lock_api | RUSTSEC-2020-0070 | UNKNOWN | 0.4.1 | >= 0.4.2 | Expand...
https://github.com/Amanieu/parking_lot/pull/262
|
-| memmap | RUSTSEC-2020-0077 | UNKNOWN | 0.7.0 | | Expand...
https://github.com/danburkert/memmap-rs/issues/90
|
-| net2 | RUSTSEC-2020-0016 | UNKNOWN | 0.2.36 | | Expand...
https://github.com/deprecrated/net2-rs/commit/3350e3819adf151709047e93f25583a5df681091
|
-| openssl-src | RUSTSEC-2021-0055 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 | Expand...
https://www.openssl.org/news/secadv/20210325.txt
|
-| openssl-src | RUSTSEC-2021-0056 | UNKNOWN | 111.12.0+1.1.1h | >= 111.15 | Expand...
https://www.openssl.org/news/secadv/20210325.txt
|
-| openssl-src | RUSTSEC-2021-0057 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 | Expand...
https://www.openssl.org/news/secadv/20210216.txt
|
-| openssl-src | RUSTSEC-2021-0058 | UNKNOWN | 111.12.0+1.1.1h | >= 111.14 | Expand...
https://www.openssl.org/news/secadv/20210216.txt
|
-| openssl-src | RUSTSEC-2021-0097 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 | Expand...
https://www.openssl.org/news/secadv/20210824.txt
|
-| openssl-src | RUSTSEC-2021-0098 | UNKNOWN | 111.12.0+1.1.1h | >= 111.16 | Expand...
https://www.openssl.org/news/secadv/20210824.txt
|
-| tar | RUSTSEC-2021-0080 | UNKNOWN | 0.4.29 | >= 0.4.36 | Expand...
https://github.com/alexcrichton/tar-rs/issues/238
|
-| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | | Expand...
https://github.com/Stebalien/term/issues/93
|
| term | RUSTSEC-2018-0015 | UNKNOWN | 0.6.1 | | Expand...
https://github.com/Stebalien/term/issues/93
|
| time | RUSTSEC-2020-0071 | UNKNOWN | 0.1.43 | >= 0.2.23 | Expand...
https://github.com/time-rs/time/issues/293
|
-| tokio | RUSTSEC-2021-0124 | UNKNOWN | 0.2.24 | >= 1.8.4, < 1.9.0, >= 1.13.1 | Expand...
https://github.com/tokio-rs/tokio/issues/4225
|
+| tokio | RUSTSEC-2021-0124 | UNKNOWN | 1.8.2 | >= 1.8.4, < 1.9.0, >= 1.13.1 | Expand...
https://github.com/tokio-rs/tokio/issues/4225
|
| yaml-rust | RUSTSEC-2018-0006 | UNKNOWN | 0.3.5 | >= 0.4.1 | Expand...
https://github.com/chyh1990/yaml-rust/pull/109
|
**cargo**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| cranelift-codegen | RUSTSEC-2021-0067 | UNKNOWN | 0.70.0 | >= 0.73.1 | Expand...
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5
|
+| No Vulnerabilities found |
+|:---------------------------------|
+
+
**cargo**
-| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
-|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
-| term | RUSTSEC-2018-0015 | UNKNOWN | 0.0.0 | | Expand...
https://github.com/Stebalien/term/issues/93
|
+| No Vulnerabilities found |
+|:---------------------------------|
diff --git a/docs/apps/stable/grafana/CHANGELOG.md b/docs/apps/stable/grafana/CHANGELOG.md
index c73eb6b739c..94c688108c1 100644
--- a/docs/apps/stable/grafana/CHANGELOG.md
+++ b/docs/apps/stable/grafana/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [grafana-2.0.16](https://github.com/truecharts/apps/compare/grafana-2.0.15...grafana-2.0.16) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [grafana-2.0.15](https://github.com/truecharts/apps/compare/grafana-2.0.14...grafana-2.0.15) (2022-01-03)
diff --git a/docs/apps/stable/grafana/helm-values.md b/docs/apps/stable/grafana/helm-values.md
index 1338271b51a..adf4db0b776 100644
--- a/docs/apps/stable/grafana/helm-values.md
+++ b/docs/apps/stable/grafana/helm-values.md
@@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.GF_PATHS_PROVISIONING | string | `"/opt/bitnami/grafana/conf/provisioning"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/grafana"` | |
-| image.tag | string | `"v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26"` | |
+| image.tag | string | `"v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f"` | |
| metrics.enabled | bool | See values.yaml | Enable and configure a Prometheus serviceMonitor for the chart under this key. |
| metrics.prometheusRule | object | See values.yaml | Enable and configure Prometheus Rules for the chart under this key. |
| metrics.prometheusRule.rules | list | See prometheusrules.yaml | Configure additionial rules for the chart under this key. |
diff --git a/docs/apps/stable/grafana/security.md b/docs/apps/stable/grafana/security.md
index f8a7c028664..7d78366ae08 100644
--- a/docs/apps/stable/grafana/security.md
+++ b/docs/apps/stable/grafana/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26
+ tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:00d9bdb3e0026d0ba08c2ce2a457ca720cf5d2336d0ec7762f76e8dc1f8e4d26 (debian 10.11)
+#### Container: tccr.io/truecharts/grafana:v8.3.3@sha256:01ddfe5ea57d49d4568eb6aaa936fea4db3fff6ff8d12dd298cc4aec136c4c6f (debian 10.11)
**debian**
diff --git a/docs/apps/stable/piaware/CHANGELOG.md b/docs/apps/stable/piaware/CHANGELOG.md
index ff604b359a5..1bdf8220c61 100644
--- a/docs/apps/stable/piaware/CHANGELOG.md
+++ b/docs/apps/stable/piaware/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [piaware-4.0.36](https://github.com/truecharts/apps/compare/piaware-4.0.35...piaware-4.0.36) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [piaware-4.0.35](https://github.com/truecharts/apps/compare/piaware-4.0.34...piaware-4.0.35) (2022-01-03)
diff --git a/docs/apps/stable/piaware/helm-values.md b/docs/apps/stable/piaware/helm-values.md
index 46dfd400955..ed8a3b16373 100644
--- a/docs/apps/stable/piaware/helm-values.md
+++ b/docs/apps/stable/piaware/helm-values.md
@@ -16,7 +16,7 @@ You will, however, be able to use all values referenced in the common chart here
| env.TZ | string | `"UTC"` | Set the container timezone |
| image.pullPolicy | string | `"IfNotPresent"` | image pull policy |
| image.repository | string | `"tccr.io/truecharts/piaware"` | image repository |
-| image.tag | string | `"v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e"` | image tag |
+| image.tag | string | `"v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c"` | image tag |
| persistence | object | See values.yaml | Configure persistence settings for the chart under this key. |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
diff --git a/docs/apps/stable/piaware/security.md b/docs/apps/stable/piaware/security.md
index 7ab8397ee2d..798aa48e108 100644
--- a/docs/apps/stable/piaware/security.md
+++ b/docs/apps/stable/piaware/security.md
@@ -33,7 +33,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e
+ tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c
##### Scan Results
@@ -70,7 +70,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/piaware:v6.1@sha256:b09f2380d725340ea6389c492b7bf56ceb7cfd018dd16714e9166f8e5513883e (debian 10.11)
+#### Container: tccr.io/truecharts/piaware:v6.1@sha256:f6a5cacfcac1fc1d93d8e4d2dd17fbb4d5a5f6ad57e752c822264012c4e8096c (debian 10.11)
**debian**
diff --git a/docs/apps/stable/quassel-core/CHANGELOG.md b/docs/apps/stable/quassel-core/CHANGELOG.md
index 12ffacef66b..6b4230130e9 100644
--- a/docs/apps/stable/quassel-core/CHANGELOG.md
+++ b/docs/apps/stable/quassel-core/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [quassel-core-0.0.10](https://github.com/truecharts/apps/compare/quassel-core-0.0.9...quassel-core-0.0.10) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [quassel-core-0.0.9](https://github.com/truecharts/apps/compare/quassel-core-0.0.8...quassel-core-0.0.9) (2021-12-28)
diff --git a/docs/apps/stable/quassel-core/helm-values.md b/docs/apps/stable/quassel-core/helm-values.md
index 64ba6a657f9..2b5550074ae 100644
--- a/docs/apps/stable/quassel-core/helm-values.md
+++ b/docs/apps/stable/quassel-core/helm-values.md
@@ -23,7 +23,7 @@ You will, however, be able to use all values referenced in the common chart here
| envValueFrom.DB_PGSQL_PASSWORD.secretKeyRef.name | string | `"dbcreds"` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/quassel-core"` | |
-| image.tag | string | `"v0.13.1"` | |
+| image.tag | string | `"v0.14.0"` | |
| persistence.varrun.enabled | bool | `true` | |
| podSecurityContext.runAsGroup | int | `0` | |
| podSecurityContext.runAsUser | int | `0` | |
diff --git a/docs/apps/stable/quassel-core/security.md b/docs/apps/stable/quassel-core/security.md
index 5ee282e69c5..b01e2b37ce0 100644
--- a/docs/apps/stable/quassel-core/security.md
+++ b/docs/apps/stable/quassel-core/security.md
@@ -52,7 +52,7 @@ hide:
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
tccr.io/truecharts/postgresql:v14.1.0@sha256:d1849137d3b53f5b5155d2a8d47fe0129b215d0c5b53a87096423f5c4feaf0e1
- tccr.io/truecharts/quassel-core:v0.13.1
+ tccr.io/truecharts/quassel-core:v0.14.0
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
tccr.io/truecharts/postgresql:v14.1.0@sha256:f734751e367098b427baba1abec9728700f92e89d5dd370ae43910d7f2814b97
diff --git a/docs/apps/stable/radarr/CHANGELOG.md b/docs/apps/stable/radarr/CHANGELOG.md
index 52492440898..5328c3d1904 100644
--- a/docs/apps/stable/radarr/CHANGELOG.md
+++ b/docs/apps/stable/radarr/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [radarr-9.0.29](https://github.com/truecharts/apps/compare/radarr-9.0.28...radarr-9.0.29) (2022-01-04)
+
+#### Chore
+
+* update docker general non-major ([#1648](https://github.com/truecharts/apps/issues/1648))
+
+
+
### [radarr-9.0.28](https://github.com/truecharts/apps/compare/radarr-9.0.27...radarr-9.0.28) (2021-12-28)
diff --git a/docs/apps/stable/radarr/helm-values.md b/docs/apps/stable/radarr/helm-values.md
index cc8fe713f7b..35a664dccc0 100644
--- a/docs/apps/stable/radarr/helm-values.md
+++ b/docs/apps/stable/radarr/helm-values.md
@@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
| env | object | `{}` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/radarr"` | |
-| image.tag | string | `"v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f"` | |
+| image.tag | string | `"v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86"` | |
| persistence.config.enabled | bool | `true` | |
| persistence.config.mountPath | string | `"/config"` | |
| probes.liveness.custom | bool | `true` | |
diff --git a/docs/apps/stable/radarr/security.md b/docs/apps/stable/radarr/security.md
index 14b1de60a44..08a52301f0f 100644
--- a/docs/apps/stable/radarr/security.md
+++ b/docs/apps/stable/radarr/security.md
@@ -32,7 +32,7 @@ hide:
##### Detected Containers
tccr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f
+ tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86
##### Scan Results
@@ -69,7 +69,7 @@ hide:
| ssl_client | CVE-2021-42375 | MEDIUM | 1.33.1-r3 | 1.33.1-r5 | Expand...
https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/
https://security.netapp.com/advisory/ntap-20211223-0002/
|
-#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:bb3107b2b13df0abdf8fa2d31eb9af791cda06124e50c09ebd4684824cbf397f (ubuntu 20.04)
+#### Container: tccr.io/truecharts/radarr:v3.2.2.5080@sha256:101afd7f510aaa0575cfd5a2b524623d989610f5d1d030509130921f772baf86 (ubuntu 20.04)
**ubuntu**
diff --git a/docs/index.yaml b/docs/index.yaml
index 85f81bfd929..c3344f61e1a 100644
--- a/docs/index.yaml
+++ b/docs/index.yaml
@@ -495,6 +495,43 @@ entries:
- https://github.com/truecharts/apps/releases/download/apache-musicindex-2.0.21/apache-musicindex-2.0.21.tgz
version: 2.0.21
appdaemon:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - utilities
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 4.2.0
+ created: "2022-01-04T13:50:35.799825738Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ description: AppDaemon is a loosely coupled, multithreaded, sandboxed python execution
+ environment for writing automation apps for Home Assistant home automation software.
+ It also provides a configurable dashboard (HADashboard) suitable for wall mounted
+ tablets.
+ digest: 7b2c936ef8daf739b8e7f9c83a15a9236a359bc60f93eb4d8242a9dff4b0dcbe
+ home: https://github.com/truecharts/apps/tree/master/charts/stable/appdaemon
+ icon: https://truecharts.org/_static/img/appicons/appdaemon-icon.png
+ keywords:
+ - appdaemon
+ - homeautomation
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ - email: 20650065+warllo54@users.noreply.github.com
+ name: warllo54
+ url: truecharts.org
+ name: appdaemon
+ sources:
+ - https://github.com/AppDaemon/appdaemon
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/appdaemon-7.0.9/appdaemon-7.0.9.tgz
+ version: 7.0.9
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -3225,6 +3262,27 @@ entries:
- https://github.com/truecharts/apps/releases/download/collabora-online-9.0.20/collabora-online-9.0.20.tgz
version: 9.0.20
common:
+ - apiVersion: v2
+ appVersion: latest
+ created: "2022-01-04T13:50:35.9264658Z"
+ description: Function library for TrueCharts
+ digest: 78e1f9fd76dbe75b7c49bb0fd77adbc0628c12eddf1faa91fde352af3460c16c
+ home: https://github.com/truecharts/apps/tree/master/charts/common
+ icon: https://avatars.githubusercontent.com/u/76400755
+ keywords:
+ - truecharts
+ - library-chart
+ - common
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: common
+ type: library
+ urls:
+ - https://github.com/truecharts/apps/releases/download/common-8.10.2/common-8.10.2.tgz
+ version: 8.10.2
- apiVersion: v2
appVersion: latest
created: "2022-01-03T21:51:40.537842032Z"
@@ -9971,6 +10029,41 @@ entries:
- https://github.com/truecharts/apps/releases/download/gotify-5.0.13/gotify-5.0.13.tgz
version: 5.0.13
grafana:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - metrics
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 8.3.3
+ created: "2022-01-04T13:50:36.067464737Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ description: Grafana is an open source, feature rich metrics dashboard and graph
+ editor for Graphite, Elasticsearch, OpenTSDB, Prometheus and InfluxDB.
+ digest: b57ecf4671d45e1cc607ea42f3135e0173429a9c77a11fc0d7e24e5025d6abac
+ home: https://github.com/truecharts/apps/tree/master/charts/stable/grafana
+ icon: https://truecharts.org/_static/img/appicons/grafana-icon.png
+ keywords:
+ - analytics
+ - monitoring
+ - metrics
+ - logs
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: grafana
+ sources:
+ - https://github.com/bitnami/bitnami-docker-grafana
+ - https://grafana.com/
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/grafana-2.0.16/grafana-2.0.16.tgz
+ version: 2.0.16
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -16973,6 +17066,40 @@ entries:
- https://github.com/truecharts/apps/releases/download/medusa-1.0.24/medusa-1.0.24.tgz
version: 1.0.24
memcached:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - database
+ - cache
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 1.6.12
+ created: "2022-01-04T13:50:36.234769712Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ description: Memcached is a memory-backed database caching solution
+ digest: 2e6bb72c95c543ace2bfb2abf2c3c57338b2bb3f7ffd717fbb9c6d25f63a153f
+ home: https://github.com/truecharts/apps/tree/master/stable/memcached
+ icon: https://bitnami.com/assets/stacks/memcached/img/memcached-stack-220x234.png
+ keywords:
+ - memcached
+ - database
+ - cache
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: memcached
+ sources:
+ - https://github.com/bitnami/bitnami-docker-memcached
+ - http://memcached.org/
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/memcached-1.0.44/memcached-1.0.44.tgz
+ version: 1.0.44
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -23478,6 +23605,37 @@ entries:
- https://github.com/truecharts/apps/releases/download/phpldapadmin-4.0.20/phpldapadmin-4.0.20.tgz
version: 4.0.20
piaware:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - media
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: "6.1"
+ created: "2022-01-04T13:50:36.371557927Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ description: Program for forwarding ADS-B data to FlightAware
+ digest: 1445813e26d7854220449bb758037231806d9033173cc4bddf04ac15e4bd8cf2
+ home: https://github.com/truechartsapps/tree/master/charts/stable/piaware
+ icon: https://truecharts.org/_static/img/appicons/piaware-icon.png
+ keywords:
+ - piaware
+ - flight-aware
+ - flight-tracker
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: piaware
+ sources:
+ - https://github.com/flightaware/piaware
+ urls:
+ - https://github.com/truecharts/apps/releases/download/piaware-4.0.36/piaware-4.0.36.tgz
+ version: 4.0.36
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -24541,6 +24699,39 @@ entries:
- https://github.com/truecharts/apps/releases/download/podgrab-7.0.20/podgrab-7.0.20.tgz
version: 7.0.20
postgresql:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - database
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 14.1.0
+ created: "2022-01-04T13:50:36.517334789Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ description: PostgresSQL
+ digest: dbb9e54a949d530db4e7b1fb13e49a50d81796ae8a5c2c84b3f07ae04bdd303a
+ home: https://github.com/truecharts/apps/tree/master/stable/postgres
+ icon: https://d1q6f0aelx0por.cloudfront.net/product-logos/library-postgres-logo.png
+ keywords:
+ - postgres
+ - postgressql
+ - dtabase
+ - sql
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: postgresql
+ sources:
+ - https://www.postgresql.org/
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/postgresql-6.0.42/postgresql-6.0.42.tgz
+ version: 6.0.42
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -25485,6 +25676,48 @@ entries:
- https://github.com/truecharts/apps/releases/download/promcord-2.0.0/promcord-2.0.0.tgz
version: 2.0.0
prometheus:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - metrics
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 0.53.1
+ created: "2022-01-04T13:50:36.681298647Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ - condition: exporters.enabled,exporters.node-exporter.enabled
+ name: node-exporter
+ repository: https://charts.bitnami.com/bitnami
+ version: 2.3.17
+ - condition: exporters.enabled,exporters.kube-state-metrics.enabled
+ name: kube-state-metrics
+ repository: https://charts.bitnami.com/bitnami
+ version: 2.1.19
+ description: kube-prometheus-stack collects Kubernetes manifests, Grafana dashboards,
+ and Prometheus rules combined with documentation and scripts to provide easy
+ to operate end-to-end Kubernetes cluster monitoring with Prometheus using the
+ Prometheus Operator.
+ digest: ec712b89ed19685c286d36fdc502e566d5e3b0e03d677d8ae2945427acb3fd19
+ home: https://github.com/truecharts/apps/tree/master/charts/stable/prometheus
+ icon: https://truecharts.org/_static/img/appicons/prometheus-icon.png
+ keywords:
+ - metrics
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: prometheus
+ sources:
+ - https://github.com/prometheus-community/helm-charts
+ - https://github.com/prometheus-operator/kube-prometheus
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/prometheus-1.1.34/prometheus-1.1.34.tgz
+ version: 1.1.34
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -27631,6 +27864,40 @@ entries:
- https://github.com/truecharts/apps/releases/download/qbittorrent-9.0.24/qbittorrent-9.0.24.tgz
version: 9.0.24
quassel-core:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - incubator
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 0.14.0
+ created: "2022-01-04T13:50:36.85222654Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ - condition: postgresql.enabled
+ name: postgresql
+ repository: https://truecharts.org/
+ version: 6.0.40
+ description: Quassel-core is a modern, cross-platform, distributed IRC client.
+ digest: d2f9ac70c19cf32d4817e5dd4b20d2a55c6a35a3c7f183454b70c9ed828e227d
+ home: https://github.com/truecharts/apps/tree/master/charts/stable/quassel-core
+ icon: https://truecharts.org/_static/img/appicons/quassel-core-icon.png
+ keywords:
+ - quassel-core
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: quassel-core
+ sources:
+ - https://hub.docker.com/r/linuxserver/quassel-core
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/quassel-core-0.0.10/quassel-core-0.0.10.tgz
+ version: 0.0.10
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -27923,6 +28190,38 @@ entries:
- https://github.com/truecharts/apps/releases/download/quassel-web-0.0.1/quassel-web-0.0.1.tgz
version: 0.0.1
radarr:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - media
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 3.2.2.5080
+ created: "2022-01-04T13:50:37.002250725Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ description: A fork of Sonarr to work with movies à la Couchpotato
+ digest: ecb59e2397da9d9652047d56dec2fd75c62531228234953ee335f88b5cd4690c
+ home: https://github.com/truecharts/apps/tree/master/charts/stable/radarr
+ icon: https://truecharts.org/_static/img/appicons/radarr-icon.png
+ keywords:
+ - radarr
+ - torrent
+ - usenet
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: radarr
+ sources:
+ - https://github.com/Radarr/Radarr
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/radarr-9.0.29/radarr-9.0.29.tgz
+ version: 9.0.29
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -28522,6 +28821,40 @@ entries:
- https://github.com/truecharts/apps/releases/download/recipes-4.0.16/recipes-4.0.16.tgz
version: 4.0.16
redis:
+ - annotations:
+ truecharts.org/SCALE-support: "true"
+ truecharts.org/catagories: |
+ - database
+ - cache
+ truecharts.org/grade: U
+ apiVersion: v2
+ appVersion: 6.2.6
+ created: "2022-01-04T13:50:37.153363115Z"
+ dependencies:
+ - name: common
+ repository: https://truecharts.org
+ version: 8.9.26
+ description: Open source, advanced key-value store.
+ digest: 9868c5dac18ddd4e8b52d23b9332b9d88b5a8c97b537ff11b1582e07cd6734cb
+ home: https://github.com/truecharts/apps/tree/master/stable/redis
+ icon: https://bitnami.com/assets/stacks/redis/img/redis-stack-220x234.png
+ keywords:
+ - redis
+ - keyvalue
+ - database
+ kubeVersion: '>=1.16.0-0'
+ maintainers:
+ - email: info@truecharts.org
+ name: TrueCharts
+ url: https://truecharts.org
+ name: redis
+ sources:
+ - https://github.com/bitnami/bitnami-docker-redis
+ - http://redis.io/
+ type: application
+ urls:
+ - https://github.com/truecharts/apps/releases/download/redis-1.0.47/redis-1.0.47.tgz
+ version: 1.0.47
- annotations:
truecharts.org/SCALE-support: "true"
truecharts.org/catagories: |
@@ -36398,4 +36731,4 @@ entries:
urls:
- https://github.com/truecharts/apps/releases/download/zwavejs2mqtt-9.0.24/zwavejs2mqtt-9.0.24.tgz
version: 9.0.24
-generated: "2022-01-03T21:51:44.758064836Z"
+generated: "2022-01-04T13:50:37.15631083Z"