Commit new App releases for TrueCharts
Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
parent
73e34bb450
commit
d3c63f2a53
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="k8s-gateway-5.0.7"></a>
|
||||
### [k8s-gateway-5.0.7](https://github.com/truecharts/apps/compare/k8s-gateway-5.0.6...k8s-gateway-5.0.7) (2022-03-27)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major
|
||||
|
||||
|
||||
|
||||
<a name="k8s-gateway-5.0.6"></a>
|
||||
### [k8s-gateway-5.0.6](https://github.com/truecharts/apps/compare/k8s-gateway-5.0.5...k8s-gateway-5.0.6) (2022-03-26)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
* update helm general non-major helm releases ([#1852](https://github.com/truecharts/apps/issues/1852))
|
||||
|
||||
|
||||
|
||||
<a name="k8s-gateway-4.0.38"></a>
|
||||
### [k8s-gateway-4.0.38](https://github.com/truecharts/apps/compare/k8s-gateway-4.0.37...k8s-gateway-4.0.38) (2022-02-02)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1828](https://github.com/truecharts/apps/issues/1828))
|
||||
|
||||
|
|
@ -3,4 +3,4 @@ dependencies:
|
|||
repository: https://library-charts.truecharts.org
|
||||
version: 9.1.15
|
||||
digest: sha256:8f13af42bdb9c005c8b99d3443c5b350c9d99c45f485e7bbcb233fd14b3ab4f4
|
||||
generated: "2022-03-26T14:57:48.869520378Z"
|
||||
generated: "2022-03-27T05:16:54.29871519Z"
|
|
@ -1,5 +1,5 @@
|
|||
apiVersion: v2
|
||||
appVersion: "0.2.2"
|
||||
appVersion: "0.2.4"
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: https://library-charts.truecharts.org
|
||||
|
@ -20,7 +20,7 @@ name: k8s-gateway
|
|||
sources:
|
||||
- https://github.com/ori-edge/k8s_gateway
|
||||
type: application
|
||||
version: 5.0.6
|
||||
version: 5.0.7
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- networking
|
|
@ -24,7 +24,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| forward.secondary | string | `"tls://1.0.0.1"` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/k8s_gateway"` | |
|
||||
| image.tag | string | `"v0.2.2@sha256:008cb572d83e84c74c554bf6e29614aee42d057f3e1fb09c37ec7ca1bc3ec7fd"` | |
|
||||
| image.tag | string | `"v0.2.4@sha256:cc621e57c73aab461b64e561d56181c9f67b59d006ab548fedfee660f08965f9"` | |
|
||||
| podSecurityContext.runAsGroup | int | `0` | |
|
||||
| podSecurityContext.runAsUser | int | `0` | |
|
||||
| probes.liveness.custom | bool | `true` | |
|
|
@ -1,7 +1,7 @@
|
|||
image:
|
||||
repository: tccr.io/truecharts/k8s_gateway
|
||||
pullPolicy: IfNotPresent
|
||||
tag: v0.2.2@sha256:008cb572d83e84c74c554bf6e29614aee42d057f3e1fb09c37ec7ca1bc3ec7fd
|
||||
tag: v0.2.4@sha256:cc621e57c73aab461b64e561d56181c9f67b59d006ab548fedfee660f08965f9
|
||||
|
||||
securityContext:
|
||||
runAsNonRoot: false
|
|
@ -45,7 +45,7 @@ hide:
|
|||
|
||||
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
|
||||
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
|
||||
tccr.io/truecharts/k8s_gateway:v0.2.2@sha256:008cb572d83e84c74c554bf6e29614aee42d057f3e1fb09c37ec7ca1bc3ec7fd
|
||||
tccr.io/truecharts/k8s_gateway:v0.2.4@sha256:cc621e57c73aab461b64e561d56181c9f67b59d006ab548fedfee660f08965f9
|
||||
|
||||
##### Scan Results
|
||||
|
||||
|
@ -74,13 +74,8 @@ hide:
|
|||
|
||||
|
||||
|
||||
#### Container: coredns
|
||||
|
||||
|
||||
**gobinary**
|
||||
|
||||
|
||||
| Package | Vulnerability | Severity | Installed Version | Fixed Version | Links |
|
||||
|:----------------|:------------------:|:-----------:|:------------------:|:-------------:|-----------------------------------------|
|
||||
| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.6 | 0.3.7 | <details><summary>Expand...</summary></details> |
|
||||
| No Vulnerabilities found |
|
||||
|:---------------------------------|
|
||||
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="prometheus-2.0.18"></a>
|
||||
### [prometheus-2.0.18](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-3.0.6...prometheus-2.0.18) (2022-03-27)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major
|
||||
|
||||
|
||||
|
||||
<a name="prometheus-2.0.17"></a>
|
||||
### [prometheus-2.0.17](https://github.com/truecharts/apps/compare/prometheus-2.0.16...prometheus-2.0.17) (2022-03-26)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
<a name="prometheus-2.0.4"></a>
|
||||
### [prometheus-2.0.4](https://github.com/truecharts/apps/compare/prometheus-2.0.3...prometheus-2.0.4) (2022-03-15)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major ([#2175](https://github.com/truecharts/apps/issues/2175))
|
||||
|
||||
|
||||
|
||||
<a name="prometheus-2.0.3"></a>
|
||||
### [prometheus-2.0.3](https://github.com/truecharts/apps/compare/uptimerobot-prometheus-3.0.1...prometheus-2.0.3) (2022-03-08)
|
||||
|
|
@ -9,4 +9,4 @@ dependencies:
|
|||
repository: https://charts.bitnami.com/bitnami
|
||||
version: 2.2.13
|
||||
digest: sha256:bc931abee867231b15a1ea382fbacce8b679919633a1958263445383839faec5
|
||||
generated: "2022-03-26T14:33:08.336519426Z"
|
||||
generated: "2022-03-27T05:17:05.23868113Z"
|
|
@ -28,7 +28,7 @@ sources:
|
|||
- https://github.com/prometheus-community/helm-charts
|
||||
- https://github.com/prometheus-operator/kube-prometheus
|
||||
type: application
|
||||
version: 2.0.17
|
||||
version: 2.0.18
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- metrics
|
|
@ -88,7 +88,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| alertmanager.volumeMounts | list | `[]` | |
|
||||
| alertmanager.volumes | list | `[]` | |
|
||||
| alertmanagerImage.repository | string | `"tccr.io/truecharts/alertmanager"` | |
|
||||
| alertmanagerImage.tag | string | `"v0.24.0@sha256:be381f500fa63a4ee629c7ec9e02fd3acaf2b7301a701a39204ffead0de09b77"` | |
|
||||
| alertmanagerImage.tag | string | `"v0.24.0@sha256:d8a7cc5e651ec84d635eb0e8d74f72b2189886c4e395d19a42cd93f6419134cd"` | |
|
||||
| coreDns.enabled | bool | `true` | |
|
||||
| coreDns.namespace | string | `"kube-system"` | |
|
||||
| coreDns.service.enabled | bool | `true` | |
|
|
@ -12,7 +12,7 @@ thanosImage:
|
|||
|
||||
alertmanagerImage:
|
||||
repository: tccr.io/truecharts/alertmanager
|
||||
tag: v0.24.0@sha256:be381f500fa63a4ee629c7ec9e02fd3acaf2b7301a701a39204ffead0de09b77
|
||||
tag: v0.24.0@sha256:d8a7cc5e651ec84d635eb0e8d74f72b2189886c4e395d19a42cd93f6419134cd
|
||||
|
||||
global:
|
||||
labels: {}
|
|
@ -384,7 +384,7 @@ hide:
|
|||
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
|
||||
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| wget | CVE-2021-31879 | MEDIUM | 1.20.1-1.1 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href="https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html">https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href="https://savannah.gnu.org/bugs/?56909">https://savannah.gnu.org/bugs/?56909</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0002/">https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
|
||||
**gobinary**
|
||||
|
||||
|
@ -574,7 +574,7 @@ hide:
|
|||
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
|
||||
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| wget | CVE-2021-31879 | MEDIUM | 1.20.1-1.1 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href="https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html">https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href="https://savannah.gnu.org/bugs/?56909">https://savannah.gnu.org/bugs/?56909</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0002/">https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
|
||||
**gobinary**
|
||||
|
||||
|
@ -757,7 +757,7 @@ hide:
|
|||
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
|
||||
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| wget | CVE-2021-31879 | MEDIUM | 1.20.1-1.1 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879</a><br><a href="https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html">https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html</a><br><a href="https://savannah.gnu.org/bugs/?56909">https://savannah.gnu.org/bugs/?56909</a><br><a href="https://security.netapp.com/advisory/ntap-20210618-0002/">https://security.netapp.com/advisory/ntap-20210618-0002/</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
|
||||
**gobinary**
|
||||
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="impostor-server-0.0.23"></a>
|
||||
### [impostor-server-0.0.23](https://github.com/truecharts/apps/compare/impostor-server-0.0.22...impostor-server-0.0.23) (2022-03-27)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major
|
||||
|
||||
|
||||
|
||||
<a name="impostor-server-0.0.22"></a>
|
||||
### [impostor-server-0.0.22](https://github.com/truecharts/apps/compare/impostor-server-0.0.21...impostor-server-0.0.22) (2022-03-26)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
|
||||
<a name="impostor-server-0.0.11"></a>
|
||||
### [impostor-server-0.0.11](https://github.com/truecharts/apps/compare/impostor-server-0.0.10...impostor-server-0.0.11) (2022-02-28)
|
||||
|
||||
#### Chore
|
||||
|
||||
* rename `web_portal` to `open` ([#1957](https://github.com/truecharts/apps/issues/1957))
|
||||
* update docker general non-major ([#1980](https://github.com/truecharts/apps/issues/1980))
|
||||
|
||||
|
||||
|
||||
<a name="impostor-server-0.0.10"></a>
|
|
@ -3,4 +3,4 @@ dependencies:
|
|||
repository: https://library-charts.truecharts.org
|
||||
version: 9.1.15
|
||||
digest: sha256:8f13af42bdb9c005c8b99d3443c5b350c9d99c45f485e7bbcb233fd14b3ab4f4
|
||||
generated: "2022-03-26T14:32:24.620716691Z"
|
||||
generated: "2022-03-27T05:16:54.314669269Z"
|
|
@ -19,7 +19,7 @@ name: impostor-server
|
|||
sources:
|
||||
- https://github.com/truecharts/apps/tree/master/incubator/impostor-server
|
||||
type: application
|
||||
version: 0.0.22
|
||||
version: 0.0.23
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- games
|
|
@ -1,4 +1,4 @@
|
|||
image:
|
||||
repository: tccr.io/truecharts/impostor-server-nightly
|
||||
pullPolicy: IfNotPresent
|
||||
tag: vnightly@sha256:84b80cfecae507b18c9a6cd2aae1aa9c0c74722a926f541dded9053954f13cdf
|
||||
tag: vnightly@sha256:2a016fab8b732eff25a55fabe905c580f22cd228a91e826d97dda16a814f34f5
|
|
@ -22,7 +22,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| image.tag | string | `"v1.6.0@sha256:789dda6ea04417d5a7abb9f0373e53ecab7a2cd7b77fa7fc8d9620d977b0e863"` | |
|
||||
| nightlyImage.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| nightlyImage.repository | string | `"tccr.io/truecharts/impostor-server-nightly"` | |
|
||||
| nightlyImage.tag | string | `"vnightly@sha256:84b80cfecae507b18c9a6cd2aae1aa9c0c74722a926f541dded9053954f13cdf"` | |
|
||||
| nightlyImage.tag | string | `"vnightly@sha256:2a016fab8b732eff25a55fabe905c580f22cd228a91e826d97dda16a814f34f5"` | |
|
||||
| probes.liveness | object | See below | Liveness probe configuration |
|
||||
| probes.readiness | object | See below | Redainess probe configuration |
|
||||
| probes.startup | object | See below | Startup probe configuration |
|
|
@ -6,7 +6,7 @@ image:
|
|||
nightlyImage:
|
||||
repository: tccr.io/truecharts/impostor-server-nightly
|
||||
pullPolicy: IfNotPresent
|
||||
tag: vnightly@sha256:84b80cfecae507b18c9a6cd2aae1aa9c0c74722a926f541dded9053954f13cdf
|
||||
tag: vnightly@sha256:2a016fab8b732eff25a55fabe905c580f22cd228a91e826d97dda16a814f34f5
|
||||
|
||||
env:
|
||||
IMPOSTOR_Server__PublicIp: "127.0.0.1"
|
|
@ -233,5 +233,5 @@ hide:
|
|||
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
|
||||
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
|
||||
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="ghost-1.0.14"></a>
|
||||
### [ghost-1.0.14](https://github.com/truecharts/apps/compare/ghost-1.0.13...ghost-1.0.14) (2022-03-27)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major
|
||||
|
||||
|
||||
|
||||
<a name="ghost-1.0.13"></a>
|
||||
### [ghost-1.0.13](https://github.com/truecharts/apps/compare/ghost-1.0.12...ghost-1.0.13) (2022-03-26)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
#### Fix
|
||||
|
||||
* BREAKING CHANGE Move some env-vars outside of env section ([#2010](https://github.com/truecharts/apps/issues/2010))
|
||||
|
||||
|
||||
|
||||
<a name="ghost-1.0.0"></a>
|
||||
### [ghost-1.0.0](https://github.com/truecharts/apps/compare/ghost-0.0.2...ghost-1.0.0) (2022-03-03)
|
||||
|
||||
#### Chore
|
||||
|
||||
* remove fixed env from questions.yaml
|
|
@ -6,4 +6,4 @@ dependencies:
|
|||
repository: https://truecharts.org/
|
||||
version: 2.0.12
|
||||
digest: sha256:092d936ed0823f593be715262b7bb6783817a8bbe8d1f4c1be8abd83b5003c7b
|
||||
generated: "2022-03-26T17:38:08.934247586Z"
|
||||
generated: "2022-03-27T05:16:55.395616311Z"
|
|
@ -1,5 +1,5 @@
|
|||
apiVersion: v2
|
||||
appVersion: "4.41.2"
|
||||
appVersion: "4.41.3"
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: https://library-charts.truecharts.org
|
||||
|
@ -25,7 +25,7 @@ sources:
|
|||
- https://github.com/TryGhost/Ghost
|
||||
- https://hub.docker.com/_/ghost
|
||||
- https://ghost.org/docs/
|
||||
version: 1.0.13
|
||||
version: 1.0.14
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- productivity
|
|
@ -51,7 +51,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| envValueFrom.database__connection__password.secretKeyRef.name | string | `"mariadbcreds"` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/ghost"` | |
|
||||
| image.tag | string | `"v4.41.2@sha256:578a77eae44cb7e388a63c46893dfeefd99e228622994c8c94ef241558cfcfa8"` | |
|
||||
| image.tag | string | `"v4.41.3@sha256:2bf2e4c955ba6969bf0b9f1ffd5d299f3ad718dfde2fff6e8ee4435be0eff0d0"` | |
|
||||
| mariadb.enabled | bool | `true` | |
|
||||
| mariadb.existingSecret | string | `"mariadbcreds"` | |
|
||||
| mariadb.mariadbDatabase | string | `"ghost"` | |
|
|
@ -1,6 +1,6 @@
|
|||
image:
|
||||
repository: tccr.io/truecharts/ghost
|
||||
tag: v4.41.2@sha256:578a77eae44cb7e388a63c46893dfeefd99e228622994c8c94ef241558cfcfa8
|
||||
tag: v4.41.3@sha256:2bf2e4c955ba6969bf0b9f1ffd5d299f3ad718dfde2fff6e8ee4435be0eff0d0
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
env:
|
|
@ -75,7 +75,7 @@ hide:
|
|||
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
|
||||
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
|
||||
tccr.io/truecharts/mariadb:v10.7.3@sha256:63743b10ac562b8f63abd3dfa246298c6678cfeb9e7559c65265f5066385fcf6
|
||||
tccr.io/truecharts/ghost:v4.41.2@sha256:578a77eae44cb7e388a63c46893dfeefd99e228622994c8c94ef241558cfcfa8
|
||||
tccr.io/truecharts/ghost:v4.41.3@sha256:2bf2e4c955ba6969bf0b9f1ffd5d299f3ad718dfde2fff6e8ee4435be0eff0d0
|
||||
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
|
||||
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
|
||||
tccr.io/truecharts/mariadb:v10.7.3@sha256:63743b10ac562b8f63abd3dfa246298c6678cfeb9e7559c65265f5066385fcf6
|
||||
|
@ -280,7 +280,7 @@ hide:
|
|||
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
|
||||
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
|
||||
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
|
||||
**gobinary**
|
||||
|
||||
|
@ -298,7 +298,7 @@ hide:
|
|||
|
||||
|
||||
|
||||
#### Container: tccr.io/truecharts/ghost:v4.41.2@sha256:578a77eae44cb7e388a63c46893dfeefd99e228622994c8c94ef241558cfcfa8 (debian 11.2)
|
||||
#### Container: tccr.io/truecharts/ghost:v4.41.3@sha256:2bf2e4c955ba6969bf0b9f1ffd5d299f3ad718dfde2fff6e8ee4435be0eff0d0 (debian 11.2)
|
||||
|
||||
|
||||
**debian**
|
||||
|
@ -384,7 +384,7 @@ hide:
|
|||
| perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a><br><a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a><br><a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a><br><a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a><br><a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a><br></details> |
|
||||
| tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 | | <details><summary>Expand...</summary><a href="http://marc.info/?l=bugtraq&m=112327628230258&w=2">http://marc.info/?l=bugtraq&m=112327628230258&w=2</a><br><a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a><br></details> |
|
||||
| util-linux | CVE-2022-0563 | LOW | 2.36.1-8+deb11u1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-2 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
|
||||
**node-pkg**
|
||||
|
||||
|
@ -395,7 +395,6 @@ hide:
|
|||
| ansi-regex | CVE-2021-3807 | HIGH | 4.1.0 | 4.1.1, 5.0.1, 6.0.1 | <details><summary>Expand...</summary><a href="https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908">https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908</a><br><a href="https://github.com/advisories/GHSA-93q8-gq69-wqmw">https://github.com/advisories/GHSA-93q8-gq69-wqmw</a><br><a href="https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9">https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311">https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311</a><br><a href="https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774">https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774</a><br><a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994</a><br><a href="https://linux.oracle.com/cve/CVE-2021-3807.html">https://linux.oracle.com/cve/CVE-2021-3807.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2022-0350.html">https://linux.oracle.com/errata/ELSA-2022-0350.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">https://nvd.nist.gov/vuln/detail/CVE-2021-3807</a><br></details> |
|
||||
| express-brute | GHSA-984p-xq9m-4rjw | MEDIUM | 1.0.1 | | <details><summary>Expand...</summary><a href="https://github.com/AdamPflug/express-brute/issues/46">https://github.com/AdamPflug/express-brute/issues/46</a><br><a href="https://github.com/advisories/GHSA-984p-xq9m-4rjw">https://github.com/advisories/GHSA-984p-xq9m-4rjw</a><br><a href="https://snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457">https://snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457</a><br><a href="https://www.npmjs.com/advisories/823">https://www.npmjs.com/advisories/823</a><br></details> |
|
||||
| express-hbs | CVE-2021-32817 | MEDIUM | 2.4.0 | | <details><summary>Expand...</summary><a href="https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability">https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability</a><br><a href="https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e">https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e</a><br><a href="https://github.com/advisories/GHSA-rwxp-hwwf-653v">https://github.com/advisories/GHSA-rwxp-hwwf-653v</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32817">https://nvd.nist.gov/vuln/detail/CVE-2021-32817</a><br><a href="https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/">https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/</a><br><a href="https://www.npmjs.com/package/express-hbs">https://www.npmjs.com/package/express-hbs</a><br></details> |
|
||||
| follow-redirects | CVE-2022-0536 | MEDIUM | 1.14.7 | 1.14.8 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-pw2r-vq6v-hr8c">https://github.com/advisories/GHSA-pw2r-vq6v-hr8c</a><br><a href="https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445">https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445</a><br><a href="https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db">https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0536">https://nvd.nist.gov/vuln/detail/CVE-2022-0536</a><br></details> |
|
||||
| js-yaml | GHSA-8j8c-7jfh-h6hx | HIGH | 1.0.3 | 3.13.1 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-8j8c-7jfh-h6hx">https://github.com/advisories/GHSA-8j8c-7jfh-h6hx</a><br><a href="https://github.com/nodeca/js-yaml/pull/480">https://github.com/nodeca/js-yaml/pull/480</a><br><a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a><br></details> |
|
||||
| js-yaml | CVE-2013-4660 | MEDIUM | 1.0.3 | >= 2.0.5 | <details><summary>Expand...</summary><a href="http://portal.nodesecurity.io/advisories/js-yaml">http://portal.nodesecurity.io/advisories/js-yaml</a><br><a href="https://github.com/advisories/GHSA-xxvw-45rp-3mj2">https://github.com/advisories/GHSA-xxvw-45rp-3mj2</a><br><a href="https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/">https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/</a><br><a href="https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/)">https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/)</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4660">https://nvd.nist.gov/vuln/detail/CVE-2013-4660</a><br><a href="https://www.npmjs.com/advisories/16">https://www.npmjs.com/advisories/16</a><br></details> |
|
||||
| js-yaml | GHSA-2pr6-76vf-7546 | MEDIUM | 1.0.3 | 3.13.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-2pr6-76vf-7546">https://github.com/advisories/GHSA-2pr6-76vf-7546</a><br><a href="https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235">https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235</a><br><a href="https://github.com/nodeca/js-yaml/issues/475">https://github.com/nodeca/js-yaml/issues/475</a><br><a href="https://snyk.io/vuln/SNYK-JS-JSYAML-173999">https://snyk.io/vuln/SNYK-JS-JSYAML-173999</a><br><a href="https://www.npmjs.com/advisories/788">https://www.npmjs.com/advisories/788</a><br><a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a><br></details> |
|
||||
|
@ -404,9 +403,6 @@ hide:
|
|||
| minimist | CVE-2021-44906 | CRITICAL | 1.2.5 | 1.2.6 | <details><summary>Expand...</summary><a href="https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip">https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip</a><br><a href="https://github.com/advisories/GHSA-xvch-5gv4-984h">https://github.com/advisories/GHSA-xvch-5gv4-984h</a><br><a href="https://github.com/substack/minimist/blob/master/index.js#L69">https://github.com/substack/minimist/blob/master/index.js#L69</a><br><a href="https://github.com/substack/minimist/issues/164">https://github.com/substack/minimist/issues/164</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">https://nvd.nist.gov/vuln/detail/CVE-2021-44906</a><br><a href="https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://security.snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://snyk.io/vuln/SNYK-JS-MINIMIST-559764">https://snyk.io/vuln/SNYK-JS-MINIMIST-559764</a><br><a href="https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068">https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068</a><br></details> |
|
||||
| netmask | CVE-2021-28918 | CRITICAL | 1.0.6 | 1.1.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-4c7m-wxvm-r7gc">https://github.com/advisories/GHSA-4c7m-wxvm-r7gc</a><br><a href="https://github.com/advisories/GHSA-pch5-whg9-qr2r">https://github.com/advisories/GHSA-pch5-whg9-qr2r</a><br><a href="https://github.com/rs/node-netmask">https://github.com/rs/node-netmask</a><br><a href="https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021">https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021</a><br><a href="https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md">https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-28918">https://nvd.nist.gov/vuln/detail/CVE-2021-28918</a><br><a href="https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/">https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/</a><br><a href="https://security.netapp.com/advisory/ntap-20210528-0010/">https://security.netapp.com/advisory/ntap-20210528-0010/</a><br><a href="https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918">https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918</a><br><a href="https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/">https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/</a><br><a href="https://www.npmjs.com/package/netmask">https://www.npmjs.com/package/netmask</a><br></details> |
|
||||
| netmask | CVE-2021-29418 | MEDIUM | 1.0.6 | 2.0.1 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-pch5-whg9-qr2r">https://github.com/advisories/GHSA-pch5-whg9-qr2r</a><br><a href="https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4">https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-29418">https://nvd.nist.gov/vuln/detail/CVE-2021-29418</a><br><a href="https://security.netapp.com/advisory/ntap-20210604-0001/">https://security.netapp.com/advisory/ntap-20210604-0001/</a><br><a href="https://sick.codes/sick-2021-011">https://sick.codes/sick-2021-011</a><br><a href="https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918">https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918</a><br><a href="https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/">https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/</a><br><a href="https://vuln.ryotak.me/advisories/6">https://vuln.ryotak.me/advisories/6</a><br><a href="https://www.npmjs.com/package/netmask">https://www.npmjs.com/package/netmask</a><br></details> |
|
||||
| node-forge | CVE-2022-24771 | HIGH | 1.2.1 | 1.3.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-cfm4-qjh2-4765">https://github.com/advisories/GHSA-cfm4-qjh2-4765</a><br><a href="https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1">https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1</a><br><a href="https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2">https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765">https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24771">https://nvd.nist.gov/vuln/detail/CVE-2022-24771</a><br></details> |
|
||||
| node-forge | CVE-2022-24772 | HIGH | 1.2.1 | 1.3.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-x4jg-mjrx-434g">https://github.com/advisories/GHSA-x4jg-mjrx-434g</a><br><a href="https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1">https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1</a><br><a href="https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2">https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g">https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24772">https://nvd.nist.gov/vuln/detail/CVE-2022-24772</a><br></details> |
|
||||
| node-forge | CVE-2022-24773 | MEDIUM | 1.2.1 | 1.3.0 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-2r2c-g63r-vccr">https://github.com/advisories/GHSA-2r2c-g63r-vccr</a><br><a href="https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1">https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1</a><br><a href="https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2">https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2</a><br><a href="https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr">https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24773">https://nvd.nist.gov/vuln/detail/CVE-2022-24773</a><br></details> |
|
||||
| nth-check | CVE-2021-3803 | HIGH | 1.0.2 | 2.0.1 | <details><summary>Expand...</summary><a href="https://github.com/advisories/GHSA-rp65-9cf3-cjxr">https://github.com/advisories/GHSA-rp65-9cf3-cjxr</a><br><a href="https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726">https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726</a><br><a href="https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0">https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3803">https://nvd.nist.gov/vuln/detail/CVE-2021-3803</a><br></details> |
|
||||
| pac-resolver | CVE-2021-23406 | CRITICAL | 3.0.0 | 5.0.0 | <details><summary>Expand...</summary><a href="Upstream patches:">Upstream patches:</a><br><a href="https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e">https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e</a><br><a href="https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5">https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5</a><br><a href="https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0">https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0</a><br><a href="https://github.com/advisories/GHSA-9j49-mfvp-vmhm">https://github.com/advisories/GHSA-9j49-mfvp-vmhm</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23406">https://nvd.nist.gov/vuln/detail/CVE-2021-23406</a><br><a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506</a><br><a href="https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857">https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857</a><br></details> |
|
||||
| tar | CVE-2021-32803 | HIGH | 2.2.2 | 6.1.2, 5.0.7, 4.4.15, 3.2.3 | <details><summary>Expand...</summary><a href="https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf</a><br><a href="https://github.com/advisories/GHSA-r628-mhmh-qjhw">https://github.com/advisories/GHSA-r628-mhmh-qjhw</a><br><a href="https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20">https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20</a><br><a href="https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw">https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw</a><br><a href="https://linux.oracle.com/cve/CVE-2021-32803.html">https://linux.oracle.com/cve/CVE-2021-32803.html</a><br><a href="https://linux.oracle.com/errata/ELSA-2021-3666.html">https://linux.oracle.com/errata/ELSA-2021-3666.html</a><br><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-32803">https://nvd.nist.gov/vuln/detail/CVE-2021-32803</a><br><a href="https://www.npmjs.com/advisories/1771">https://www.npmjs.com/advisories/1771</a><br><a href="https://www.npmjs.com/package/tar">https://www.npmjs.com/package/tar</a><br><a href="https://www.oracle.com/security-alerts/cpuoct2021.html">https://www.oracle.com/security-alerts/cpuoct2021.html</a><br></details> |
|
||||
|
@ -622,7 +618,7 @@ hide:
|
|||
| tar | CVE-2021-20193 | LOW | 1.30+dfsg-6 | | <details><summary>Expand...</summary><a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a><br><a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a><br><a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a><br><a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a><br><a href="https://ubuntu.com/security/notices/USN-5329-1">https://ubuntu.com/security/notices/USN-5329-1</a><br></details> |
|
||||
| util-linux | CVE-2021-37600 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a><br><a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a><br><a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a><br></details> |
|
||||
| util-linux | CVE-2022-0563 | LOW | 2.33.1-0.1 | | <details><summary>Expand...</summary><a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
| zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-1 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2022/03/25/2">http://www.openwall.com/lists/oss-security/2022/03/25/2</a><br><a href="http://www.openwall.com/lists/oss-security/2022/03/26/1">http://www.openwall.com/lists/oss-security/2022/03/26/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032</a><br><a href="https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531">https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531</a><br><a href="https://www.openwall.com/lists/oss-security/2022/03/24/1">https://www.openwall.com/lists/oss-security/2022/03/24/1</a><br></details> |
|
||||
|
||||
**gobinary**
|
||||
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="littlelink-5.0.10"></a>
|
||||
### [littlelink-5.0.10](https://github.com/truecharts/apps/compare/littlelink-5.0.9...littlelink-5.0.10) (2022-03-27)
|
||||
|
||||
#### Chore
|
||||
|
||||
* update docker general non-major
|
||||
|
||||
|
||||
|
||||
<a name="littlelink-5.0.9"></a>
|
||||
### [littlelink-5.0.9](https://github.com/truecharts/apps/compare/littlelink-5.0.8...littlelink-5.0.9) (2022-03-26)
|
||||
|
||||
|
@ -88,12 +97,3 @@
|
|||
|
||||
#### Chore
|
||||
|
||||
* update helm general non-major helm releases ([#1927](https://github.com/truecharts/apps/issues/1927))
|
||||
|
||||
|
||||
|
||||
<a name="littlelink-4.0.63"></a>
|
||||
### [littlelink-4.0.63](https://github.com/truecharts/apps/compare/littlelink-4.0.62...littlelink-4.0.63) (2022-02-21)
|
||||
|
||||
#### Chore
|
||||
|
|
@ -3,4 +3,4 @@ dependencies:
|
|||
repository: https://library-charts.truecharts.org
|
||||
version: 9.1.15
|
||||
digest: sha256:8f13af42bdb9c005c8b99d3443c5b350c9d99c45f485e7bbcb233fd14b3ab4f4
|
||||
generated: "2022-03-26T14:34:03.335901773Z"
|
||||
generated: "2022-03-27T05:17:32.795043376Z"
|
|
@ -20,7 +20,7 @@ sources:
|
|||
- https://github.com/techno-tim/littlelink-server
|
||||
- https://github.com/sethcottle/littlelink
|
||||
type: application
|
||||
version: 5.0.9
|
||||
version: 5.0.10
|
||||
annotations:
|
||||
truecharts.org/catagories: |
|
||||
- social
|
|
@ -14,7 +14,7 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
| envFrom[0].configMapRef.name | string | `"littlelinkconfig"` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/littlelink-server"` | |
|
||||
| image.tag | string | `"latest@sha256:f6865f1205bf66da8832b2fb3b68355d1c02c571fc0849fb3915aead0ce970cd"` | |
|
||||
| image.tag | string | `"latest@sha256:882f45dc6c5d7c3c262924d8421cb0818382b46d67e72c65a849c00d2857cad8"` | |
|
||||
| littlelink.avatar_2x_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_400x400.jpg"` | |
|
||||
| littlelink.avatar_alt | string | `"techno tim profile pic"` | |
|
||||
| littlelink.avatar_url | string | `"https://pbs.twimg.com/profile_images/1286144221217316864/qiaskopb_200x200.jpg"` | |
|
|
@ -1,7 +1,7 @@
|
|||
image:
|
||||
repository: tccr.io/truecharts/littlelink-server
|
||||
pullPolicy: IfNotPresent
|
||||
tag: latest@sha256:f6865f1205bf66da8832b2fb3b68355d1c02c571fc0849fb3915aead0ce970cd
|
||||
tag: latest@sha256:882f45dc6c5d7c3c262924d8421cb0818382b46d67e72c65a849c00d2857cad8
|
||||
|
||||
service:
|
||||
main:
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue