Commit new App releases for TrueCharts
Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
parent
fd00e86e10
commit
3f3acb888b
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="authentik-0.0.3"></a>
|
||||
### [authentik-0.0.3](https://github.com/truecharts/apps/compare/authentik-0.0.2...authentik-0.0.3) (2022-04-23)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update db name ([#2540](https://github.com/truecharts/apps/issues/2540))
|
||||
|
||||
|
||||
|
||||
<a name="authentik-0.0.2"></a>
|
||||
### [authentik-0.0.2](https://github.com/truecharts/apps/compare/authentik-0.0.1...authentik-0.0.2) (2022-04-22)
|
||||
|
|
@ -9,4 +9,4 @@ dependencies:
|
|||
repository: https://charts.truecharts.org
|
||||
version: 2.0.40
|
||||
digest: sha256:79a7d6bb46936b025fe5cab73b2bad420cc75e3837c2b856908b9b0d4633825d
|
||||
generated: "2022-04-23T01:25:27.205484772Z"
|
||||
generated: "2022-04-23T15:37:53.526381109Z"
|
|
@ -26,7 +26,7 @@ name: authentik
|
|||
sources:
|
||||
- https://github.com/goauthentik/authentik
|
||||
- https://goauthentik.io/docs/
|
||||
version: 0.0.2
|
||||
version: 0.0.3
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- authentication
|
|
@ -215,8 +215,8 @@ persistence:
|
|||
postgresql:
|
||||
enabled: true
|
||||
existingSecret: "dbcreds"
|
||||
postgresqlUsername: baserow
|
||||
postgresqlDatabase: baserow
|
||||
postgresqlUsername: authentik
|
||||
postgresqlDatabase: authentik
|
||||
|
||||
redis:
|
||||
enabled: true
|
|
@ -619,7 +619,7 @@ hide:
|
|||
| linux-libc-dev | CVE-2021-26934 | LOW | 5.10.106-1 | | <details><summary>Expand...</summary><a href="http://xenbits.xen.org/xsa/advisory-363.html">http://xenbits.xen.org/xsa/advisory-363.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26934">https://nvd.nist.gov/vuln/detail/CVE-2021-26934</a><br><a href="https://security.netapp.com/advisory/ntap-20210326-0001/">https://security.netapp.com/advisory/ntap-20210326-0001/</a><br><a href="https://www.openwall.com/lists/oss-security/2021/02/16/2">https://www.openwall.com/lists/oss-security/2021/02/16/2</a><br><a href="https://xenbits.xen.org/xsa/advisory-363.html">https://xenbits.xen.org/xsa/advisory-363.html</a><br></details> |
|
||||
| linux-libc-dev | CVE-2021-32078 | LOW | 5.10.106-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2021-32078">https://access.redhat.com/security/cve/CVE-2021-32078</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href="https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)">https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)</a><br><a href="https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f">https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f</a><br><a href="https://kirtikumarar.com/CVE-2021-32078.txt">https://kirtikumarar.com/CVE-2021-32078.txt</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32078">https://nvd.nist.gov/vuln/detail/CVE-2021-32078</a><br><a href="https://security.netapp.com/advisory/ntap-20210813-0002/">https://security.netapp.com/advisory/ntap-20210813-0002/</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-25265 | LOW | 5.10.106-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2022-25265">https://access.redhat.com/security/cve/CVE-2022-25265</a><br><a href="https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294">https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294</a><br><a href="https://github.com/x0reaxeax/exec-prot-bypass">https://github.com/x0reaxeax/exec-prot-bypass</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25265">https://nvd.nist.gov/vuln/detail/CVE-2022-25265</a><br><a href="https://security.netapp.com/advisory/ntap-20220318-0005/">https://security.netapp.com/advisory/ntap-20220318-0005/</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-29582 | UNKNOWN | 5.10.106-1 | | <details><summary>Expand...</summary><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e677edbcabee849bfdd43f1602bccbecf736a646">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e677edbcabee849bfdd43f1602bccbecf736a646</a><br><a href="https://github.com/torvalds/linux/commit/e677edbcabee849bfdd43f1602bccbecf736a646">https://github.com/torvalds/linux/commit/e677edbcabee849bfdd43f1602bccbecf736a646</a><br><a href="https://www.openwall.com/lists/oss-security/2022/04/22/3">https://www.openwall.com/lists/oss-security/2022/04/22/3</a><br></details> |
|
||||
| linux-libc-dev | CVE-2022-29582 | UNKNOWN | 5.10.106-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/04/22/4">http://www.openwall.com/lists/oss-security/2022/04/22/4</a><br><a href="https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3">https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3</a><br><a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e677edbcabee849bfdd43f1602bccbecf736a646">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e677edbcabee849bfdd43f1602bccbecf736a646</a><br><a href="https://github.com/torvalds/linux/commit/e677edbcabee849bfdd43f1602bccbecf736a646">https://github.com/torvalds/linux/commit/e677edbcabee849bfdd43f1602bccbecf736a646</a><br><a href="https://www.openwall.com/lists/oss-security/2022/04/22/3">https://www.openwall.com/lists/oss-security/2022/04/22/3</a><br></details> |
|
||||
| login | CVE-2007-5686 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a><br><a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a><br><a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a><br><a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a><br><a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a><br><a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a><br></details> |
|
||||
| login | CVE-2013-4235 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2013-4235">https://access.redhat.com/security/cve/CVE-2013-4235</a><br><a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a><br><a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a><br><a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a><br></details> |
|
||||
| login | CVE-2019-19882 | LOW | 1:4.8.1-1 | | <details><summary>Expand...</summary><a href="https://access.redhat.com/security/cve/CVE-2019-19882">https://access.redhat.com/security/cve/CVE-2019-19882</a><br><a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a><br><a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a><br><a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a><br><a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a><br><a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a><br><a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a><br></details> |
|
Loading…
Reference in New Issue