scale-catalog/old-website/apps/stable/ghost/security/index.html

8 lines
1.1 MiB
HTML
Raw Normal View History

<!doctype html><html lang=en class=no-js> <head><meta charset=utf-8><meta name=viewport content="width=device-width,initial-scale=1"><meta name=description content="Project Documentation for TrueCharts"><meta name=author content="TrueCharts Team"><link href=https://truecharts.org/apps/stable/ghost/security/ rel=canonical><link rel=icon href=../../../../_static/img/favicon.png><meta name=generator content="mkdocs-1.3.0, mkdocs-material-8.3.8"><title>Security Overview - TrueCharts</title><link rel=stylesheet href=../../../../assets/stylesheets/main.1d29e8d0.min.css><link rel=stylesheet href=../../../../assets/stylesheets/palette.cbb835fc.min.css><link rel=preconnect href=https://fonts.gstatic.com crossorigin><link rel=stylesheet href="https://fonts.googleapis.com/css?family=Roboto:300,300i,400,400i,700,700i%7CRoboto+Mono:400,400i,700,700i&display=fallback"><style>:root{--md-text-font:"Roboto";--md-code-font:"Roboto Mono"}</style><link rel=stylesheet href=../../../../_static/custom.css><script>__md_scope=new URL("../../../..",location),__md_get=(e,_=localStorage,t=__md_scope)=>JSON.parse(_.getItem(t.pathname+"."+e)),__md_set=(e,_,t=localStorage,a=__md_scope)=>{try{t.setItem(a.pathname+"."+e,JSON.stringify(_))}catch(e){}}</script><script>function gtag(){dataLayer.push(arguments)}window.dataLayer=window.dataLayer||[],gtag("js",new Date),gtag("config","G-6G6694723V"),document.addEventListener("DOMContentLoaded",function(){document.forms.search&&document.forms.search.query.addEventListener("blur",function(){this.value&&gtag("event","search",{search_term:this.value})}),"undefined"!=typeof location$&&location$.subscribe(function(e){gtag("config","G-6G6694723V",{page_path:e.pathname})})})</script><script async src="https://www.googletagmanager.com/gtag/js?id=G-6G6694723V"></script></head> <body dir=ltr data-md-color-scheme data-md-color-primary=none data-md-color-accent=none> <input class=md-toggle data-md-toggle=drawer type=checkbox id=__drawer autocomplete=off> <input class=md-toggle data-md-toggle=search type=checkbox id=__search autocomplete=off> <label class=md-overlay for=__drawer></label> <div data-md-component=skip> <a href=#security-overview class=md-skip> Skip to content </a> </div> <div data-md-component=announce> </div> <header class=md-header data-md-component=header> <nav class="md-header__inner md-grid" aria-label=Header> <a href=../../../.. title=TrueCharts class="md-header__button md-logo" aria-label=TrueCharts data-md-component=logo> <img src=../../../../_static/img/logo1024.png alt=logo> </a> <label class="md-header__button md-icon" for=__drawer> <svg xmlns=http://www.w3.org/2000/svg viewbox="0 0 24 24"><path d="M3 6h18v2H3V6m0 5h18v2H3v-2m0 5h18v2H3v-2Z"/></svg> </label> <div class=md-header__title data-md-component=header-title> <div class=md-header__ellipsis> <div class=md-header__topic> <span class=md-ellipsis> TrueCharts </span> </div> <div class=md-header__topic data-md-component=header-topic> <span class=md-ellipsis> Security Overview </span> </div> </div> </div> <div class=md-header__source> <a href=https://github.com/truecharts/pub title="Go to repository" class=md-source data-md-component=source> <div class="md-source__icon md-icon"> <svg xmlns=http://www.w3.org/2000/svg viewbox="0 0 480 512"><!-- Font Awesome Free 6.1.1 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M186.1 328.7c0 20.9-10.9 55.1-36.7 55.1s-36.7-34.2-36.7-55.1 10.9-55.1 36.7-55.1 36.7 34.2 36.7 55.1zM480 278.2c0 31.9-3.2 65.7-17.5 95-37.9 76.6-142.1 74.8-216.7 74.8-75.8 0-186.2 2.7-225.6-74.8-14.6-29-20.2-63.1-20.2-95 0-41.9 13.9-81.5 41.5-113.6-5.2-15.8-7.7-32.4-7.7-48.8 0-21.5 4.9-32.3 14.6-51.8 45.3 0 74.3 9 108.8 36 29-6.9 58.8-10 88.7-10 27 0 54.2 2.9 80.4 9.2 34-26.7 63-35.2 107.8-35.2 9.8 19.5 14.6 30.3 14.6 51.8 0 16.4-2.6 32.7-7.7 48.2 27.5 32.4 39 72.3 39 114.2zm-64.3 50.5c0-43.9-26.7-82.6-73.5-82.6-18.9 0-37 3.4-56 6-14.9 2.3-29.8 3.2-45.1 3.2-15.2 0-30.1-.9-45.1-3.2-18.7-2.6-37-6-56-
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/mariadb:v10.7.3@sha256:50f683e7f83321f3f437c49a63c1c28a171aca9a90129d3513713c44b776ab99
tccr.io/truecharts/ghost:v4.47.0@sha256:ce3e4141174631356bc1d1339a3afd3c78c808fde8359ef106123cbd72ec8784
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
tccr.io/truecharts/mariadb:v10.7.3@sha256:50f683e7f83321f3f437c49a63c1c28a171aca9a90129d3513713c44b776ab99
</code></pre></div> <h5 id=scan-results_1>Scan Results<a class=headerlink href=#scan-results_1 title="Permanent link">&para;</a></h5> <h4 id=container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152>Container: tccr.io/truecharts/alpine:v3.15.2@sha256:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)<a class=headerlink href=#container-tccriotruechartsalpinev3152sha25629ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583-alpine-3152 title="Permanent link">&para;</a></h4> <p><strong>alpine</strong></p> <table> <thead> <tr> <th align=left>Package</th> <th align=center>Vulnerability</th> <th align=center>Severity</th> <th align=center>Installed Version</th> <th align=center>Fixed Version</th> <th>Links</th> </tr> </thead> <tbody> <tr> <td align=left>busybox</td> <td align=center>CVE-2022-28391</td> <td align=center>CRITICAL</td> <td align=center>1.34.1-r4</td> <td align=center>1.34.1-r5</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2022-28391>https://access.redhat.com/security/cve/CVE-2022-28391</a><br><a href=https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch>https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch</a><br><a href=https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch>https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch</a><br><a href=https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661>https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661</a><br><a href=https://nvd.nist.gov/vuln/detail/CVE-2022-28391>https://nvd.nist.gov/vuln/detail/CVE-2022-28391</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2022-22576</td> <td align=center>MEDIUM</td> <td align=center>7.80.0-r0</td> <td align=center>7.80.0-r1</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2022-22576>https://access.redhat.com/security/cve/CVE-2022-22576</a><br><a href=https://curl.se/docs/CVE-2022-22576.html>https://curl.se/docs/CVE-2022-22576.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576</a><br><a href=https://ubuntu.com/security/notices/USN-5397-1>https://ubuntu.com/security/notices/USN-5397-1</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2022-27774</td> <td align=center>MEDIUM</td> <td align=center>7.80.0-r0</td> <td align=center>7.80.0-r1</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2022-27774>https://access.redhat.com/security/cve/CVE-2022-27774</a><br><a href=https://curl.se/docs/CVE-2022-27774.html>https://curl.se/docs/CVE-2022-27774.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774</a><br><a href=https://ubuntu.com/security/notices/USN-5397-1>https://ubuntu.com/security/notices/USN-5397-1</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2022-27776</td> <td align=center>MEDIUM</td> <td align=center>7.80.0-r0</td> <td align=center>7.80.0-r1</td> <td><details><summary>Expand...</summary><a href=https://access.redhat.com/security/cve/CVE-2022-27776>https://access.redhat.com/security/cve/CVE-2022-27776</a><br><a href=https://curl.se/docs/CVE-2022-27776.html>https://curl.se/docs/CVE-2022-27776.html</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776</a><br><a href=https://ubuntu.com/security/notices/USN-5397-1>https://ubuntu.com/security/notices/USN-5397-1</a><br></details></td> </tr> <tr> <td align=left>curl</td> <td align=center>CVE-2022-27775</td> <td align=c