diff --git a/docs/snyk/index.md b/docs/snyk/index.md index 914d979bd6598..44bd30b39acc2 100644 --- a/docs/snyk/index.md +++ b/docs/snyk/index.md @@ -18,61 +18,61 @@ recent minor releases. | [dex:v2.41.1](master/ghcr.io_dexidp_dex_v2.41.1.html) | 0 | 0 | 0 | 1 | | [haproxy:2.6.17-alpine](master/public.ecr.aws_docker_library_haproxy_2.6.17-alpine.html) | 0 | 0 | 2 | 3 | | [redis:7.0.15-alpine](master/public.ecr.aws_docker_library_redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | -| [argocd:latest](master/quay.io_argoproj_argocd_latest.html) | 0 | 0 | 3 | 8 | +| [argocd:latest](master/quay.io_argoproj_argocd_latest.html) | 0 | 0 | 2 | 9 | | [redis:7.0.15-alpine](master/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | | [install.yaml](master/argocd-iac-install.html) | - | - | - | - | | [namespace-install.yaml](master/argocd-iac-namespace-install.html) | - | - | - | - | -### v2.13.0-rc3 +### v2.13.0-rc5 | | Critical | High | Medium | Low | |---:|:--------:|:----:|:------:|:---:| -| [go.mod](v2.13.0-rc3/argocd-test.html) | 0 | 0 | 7 | 0 | -| [ui/yarn.lock](v2.13.0-rc3/argocd-test.html) | 0 | 0 | 0 | 0 | -| [dex:v2.41.1](v2.13.0-rc3/ghcr.io_dexidp_dex_v2.41.1.html) | 0 | 0 | 0 | 1 | -| [haproxy:2.6.17-alpine](v2.13.0-rc3/public.ecr.aws_docker_library_haproxy_2.6.17-alpine.html) | 0 | 0 | 2 | 3 | -| [redis:7.0.15-alpine](v2.13.0-rc3/public.ecr.aws_docker_library_redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | -| [argocd:v2.13.0-rc3](v2.13.0-rc3/quay.io_argoproj_argocd_v2.13.0-rc3.html) | 0 | 0 | 3 | 8 | -| [redis:7.0.15-alpine](v2.13.0-rc3/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | -| [install.yaml](v2.13.0-rc3/argocd-iac-install.html) | - | - | - | - | -| [namespace-install.yaml](v2.13.0-rc3/argocd-iac-namespace-install.html) | - | - | - | - | +| [go.mod](v2.13.0-rc5/argocd-test.html) | 0 | 0 | 7 | 0 | +| [ui/yarn.lock](v2.13.0-rc5/argocd-test.html) | 0 | 0 | 0 | 0 | +| [dex:v2.41.1](v2.13.0-rc5/ghcr.io_dexidp_dex_v2.41.1.html) | 0 | 0 | 0 | 1 | +| [haproxy:2.6.17-alpine](v2.13.0-rc5/public.ecr.aws_docker_library_haproxy_2.6.17-alpine.html) | 0 | 0 | 2 | 3 | +| [redis:7.0.15-alpine](v2.13.0-rc5/public.ecr.aws_docker_library_redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | +| [argocd:v2.13.0-rc5](v2.13.0-rc5/quay.io_argoproj_argocd_v2.13.0-rc5.html) | 0 | 0 | 2 | 9 | +| [redis:7.0.15-alpine](v2.13.0-rc5/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | +| [install.yaml](v2.13.0-rc5/argocd-iac-install.html) | - | - | - | - | +| [namespace-install.yaml](v2.13.0-rc5/argocd-iac-namespace-install.html) | - | - | - | - | -### v2.12.4 +### v2.12.6 | | Critical | High | Medium | Low | |---:|:--------:|:----:|:------:|:---:| -| [go.mod](v2.12.4/argocd-test.html) | 0 | 0 | 8 | 0 | -| [ui/yarn.lock](v2.12.4/argocd-test.html) | 0 | 0 | 0 | 0 | -| [dex:v2.38.0](v2.12.4/ghcr.io_dexidp_dex_v2.38.0.html) | 0 | 0 | 6 | 6 | -| [haproxy:2.6.17-alpine](v2.12.4/public.ecr.aws_docker_library_haproxy_2.6.17-alpine.html) | 0 | 0 | 2 | 3 | -| [redis:7.0.15-alpine](v2.12.4/public.ecr.aws_docker_library_redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | -| [argocd:v2.12.4](v2.12.4/quay.io_argoproj_argocd_v2.12.4.html) | 0 | 0 | 3 | 8 | -| [redis:7.0.15-alpine](v2.12.4/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | -| [install.yaml](v2.12.4/argocd-iac-install.html) | - | - | - | - | -| [namespace-install.yaml](v2.12.4/argocd-iac-namespace-install.html) | - | - | - | - | +| [go.mod](v2.12.6/argocd-test.html) | 0 | 0 | 8 | 0 | +| [ui/yarn.lock](v2.12.6/argocd-test.html) | 0 | 0 | 0 | 0 | +| [dex:v2.38.0](v2.12.6/ghcr.io_dexidp_dex_v2.38.0.html) | 0 | 0 | 6 | 6 | +| [haproxy:2.6.17-alpine](v2.12.6/public.ecr.aws_docker_library_haproxy_2.6.17-alpine.html) | 0 | 0 | 2 | 3 | +| [redis:7.0.15-alpine](v2.12.6/public.ecr.aws_docker_library_redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | +| [argocd:v2.12.6](v2.12.6/quay.io_argoproj_argocd_v2.12.6.html) | 0 | 0 | 2 | 9 | +| [redis:7.0.15-alpine](v2.12.6/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | +| [install.yaml](v2.12.6/argocd-iac-install.html) | - | - | - | - | +| [namespace-install.yaml](v2.12.6/argocd-iac-namespace-install.html) | - | - | - | - | -### v2.11.9 +### v2.11.11 | | Critical | High | Medium | Low | |---:|:--------:|:----:|:------:|:---:| -| [go.mod](v2.11.9/argocd-test.html) | 0 | 1 | 9 | 0 | -| [ui/yarn.lock](v2.11.9/argocd-test.html) | 0 | 0 | 0 | 0 | -| [dex:v2.38.0](v2.11.9/ghcr.io_dexidp_dex_v2.38.0.html) | 0 | 0 | 6 | 6 | -| [haproxy:2.6.14-alpine](v2.11.9/haproxy_2.6.14-alpine.html) | 0 | 1 | 7 | 6 | -| [argocd:v2.11.9](v2.11.9/quay.io_argoproj_argocd_v2.11.9.html) | 0 | 0 | 4 | 17 | -| [redis:7.0.15-alpine](v2.11.9/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | -| [install.yaml](v2.11.9/argocd-iac-install.html) | - | - | - | - | -| [namespace-install.yaml](v2.11.9/argocd-iac-namespace-install.html) | - | - | - | - | +| [go.mod](v2.11.11/argocd-test.html) | 0 | 1 | 9 | 0 | +| [ui/yarn.lock](v2.11.11/argocd-test.html) | 0 | 0 | 0 | 0 | +| [dex:v2.38.0](v2.11.11/ghcr.io_dexidp_dex_v2.38.0.html) | 0 | 0 | 6 | 6 | +| [haproxy:2.6.14-alpine](v2.11.11/haproxy_2.6.14-alpine.html) | 0 | 1 | 7 | 6 | +| [argocd:v2.11.11](v2.11.11/quay.io_argoproj_argocd_v2.11.11.html) | 0 | 0 | 3 | 18 | +| [redis:7.0.15-alpine](v2.11.11/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | +| [install.yaml](v2.11.11/argocd-iac-install.html) | - | - | - | - | +| [namespace-install.yaml](v2.11.11/argocd-iac-namespace-install.html) | - | - | - | - | -### v2.10.17 +### v2.10.18 | | Critical | High | Medium | Low | |---:|:--------:|:----:|:------:|:---:| -| [go.mod](v2.10.17/argocd-test.html) | 0 | 1 | 9 | 0 | -| [ui/yarn.lock](v2.10.17/argocd-test.html) | 0 | 0 | 0 | 0 | -| [dex:v2.37.0](v2.10.17/ghcr.io_dexidp_dex_v2.37.0.html) | 1 | 1 | 10 | 6 | -| [haproxy:2.6.14-alpine](v2.10.17/haproxy_2.6.14-alpine.html) | 0 | 1 | 7 | 6 | -| [argocd:v2.10.17](v2.10.17/quay.io_argoproj_argocd_v2.10.17.html) | 0 | 0 | 4 | 17 | -| [redis:7.0.15-alpine](v2.10.17/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | -| [install.yaml](v2.10.17/argocd-iac-install.html) | - | - | - | - | -| [namespace-install.yaml](v2.10.17/argocd-iac-namespace-install.html) | - | - | - | - | +| [go.mod](v2.10.18/argocd-test.html) | 0 | 1 | 9 | 0 | +| [ui/yarn.lock](v2.10.18/argocd-test.html) | 0 | 0 | 0 | 0 | +| [dex:v2.37.0](v2.10.18/ghcr.io_dexidp_dex_v2.37.0.html) | 1 | 1 | 10 | 6 | +| [haproxy:2.6.14-alpine](v2.10.18/haproxy_2.6.14-alpine.html) | 0 | 1 | 7 | 6 | +| [argocd:v2.10.18](v2.10.18/quay.io_argoproj_argocd_v2.10.18.html) | 0 | 0 | 3 | 18 | +| [redis:7.0.15-alpine](v2.10.18/redis_7.0.15-alpine.html) | 0 | 0 | 0 | 0 | +| [install.yaml](v2.10.18/argocd-iac-install.html) | - | - | - | - | +| [namespace-install.yaml](v2.10.18/argocd-iac-namespace-install.html) | - | - | - | - | diff --git a/docs/snyk/master/argocd-iac-install.html b/docs/snyk/master/argocd-iac-install.html index 075b7526a6028..4322fc0c9e5a5 100644 --- a/docs/snyk/master/argocd-iac-install.html +++ b/docs/snyk/master/argocd-iac-install.html @@ -456,7 +456,7 @@
October 13th 2024, 12:21:16 am (UTC+00:00)
+October 20th 2024, 12:21:37 am (UTC+00:00)
October 13th 2024, 12:21:25 am (UTC+00:00)
+October 20th 2024, 12:21:46 am (UTC+00:00)
October 13th 2024, 12:19:05 am (UTC+00:00)
+October 20th 2024, 12:19:25 am (UTC+00:00)
October 13th 2024, 12:19:16 am (UTC+00:00)
+October 20th 2024, 12:19:34 am (UTC+00:00)
October 13th 2024, 12:19:22 am (UTC+00:00)
+October 20th 2024, 12:19:39 am (UTC+00:00)
October 13th 2024, 12:19:27 am (UTC+00:00)
+October 20th 2024, 12:19:49 am (UTC+00:00)
October 13th 2024, 12:19:45 am (UTC+00:00)
+October 20th 2024, 12:20:08 am (UTC+00:00)
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
- See How to fix?
for Ubuntu:24.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
-There is no fixed version for Ubuntu:24.04
openssl
.
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
+ See How to fix?
for Ubuntu:24.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
+There is no fixed version for Ubuntu:24.04
openssl
.
October 13th 2024, 12:19:49 am (UTC+00:00)
+October 20th 2024, 12:20:12 am (UTC+00:00)
October 13th 2024, 12:30:32 am (UTC+00:00)
+October 20th 2024, 12:30:43 am (UTC+00:00)
October 13th 2024, 12:30:40 am (UTC+00:00)
+October 20th 2024, 12:30:51 am (UTC+00:00)
October 13th 2024, 12:28:41 am (UTC+00:00)
+October 20th 2024, 12:28:51 am (UTC+00:00)
October 13th 2024, 12:28:48 am (UTC+00:00)
+October 20th 2024, 12:28:58 am (UTC+00:00)
Impact summary: Applications that use the AES-SIV algorithm and want to - authenticate empty data entries as associated data can be mislead by removing + authenticate empty data entries as associated data can be misled by removing, adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications.
The AES-SIV algorithm allows for authentication of multiple associated @@ -2752,7 +2752,7 @@
October 13th 2024, 12:26:43 am (UTC+00:00)
+October 20th 2024, 12:29:02 am (UTC+00:00)
October 13th 2024, 12:29:09 am (UTC+00:00)
+October 20th 2024, 12:29:19 am (UTC+00:00)
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
- See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
-There is no fixed version for Ubuntu:22.04
openssl
.
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
+ See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
+There is no fixed version for Ubuntu:22.04
openssl
.
October 13th 2024, 12:29:13 am (UTC+00:00)
+October 20th 2024, 12:29:23 am (UTC+00:00)
October 13th 2024, 12:28:23 am (UTC+00:00)
+October 20th 2024, 12:28:33 am (UTC+00:00)
October 13th 2024, 12:28:32 am (UTC+00:00)
+October 20th 2024, 12:28:41 am (UTC+00:00)
October 13th 2024, 12:26:31 am (UTC+00:00)
+October 20th 2024, 12:26:40 am (UTC+00:00)
October 13th 2024, 12:24:20 am (UTC+00:00)
+October 20th 2024, 12:26:46 am (UTC+00:00)
October 13th 2024, 12:28:52 am (UTC+00:00)
+October 20th 2024, 12:26:52 am (UTC+00:00)
October 13th 2024, 12:27:02 am (UTC+00:00)
+October 20th 2024, 12:27:10 am (UTC+00:00)
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
- See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
-There is no fixed version for Ubuntu:22.04
openssl
.
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
+ See How to fix?
for Ubuntu:22.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
+There is no fixed version for Ubuntu:22.04
openssl
.
October 13th 2024, 12:27:05 am (UTC+00:00)
+October 20th 2024, 12:27:14 am (UTC+00:00)
October 13th 2024, 12:26:09 am (UTC+00:00)
+October 20th 2024, 12:26:19 am (UTC+00:00)
October 13th 2024, 12:26:18 am (UTC+00:00)
+October 20th 2024, 12:26:27 am (UTC+00:00)
October 13th 2024, 12:24:12 am (UTC+00:00)
+October 20th 2024, 12:24:23 am (UTC+00:00)
October 13th 2024, 12:26:38 am (UTC+00:00)
+October 20th 2024, 12:24:32 am (UTC+00:00)
October 13th 2024, 12:24:24 am (UTC+00:00)
+October 20th 2024, 12:24:36 am (UTC+00:00)
October 13th 2024, 12:21:51 am (UTC+00:00)
+October 20th 2024, 12:24:40 am (UTC+00:00)
October 13th 2024, 12:24:44 am (UTC+00:00)
+October 20th 2024, 12:24:57 am (UTC+00:00)
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
- See How to fix?
for Ubuntu:24.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
-There is no fixed version for Ubuntu:24.04
openssl
.
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
+ See How to fix?
for Ubuntu:24.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
+There is no fixed version for Ubuntu:24.04
openssl
.
October 13th 2024, 12:22:12 am (UTC+00:00)
+October 20th 2024, 12:25:00 am (UTC+00:00)
October 13th 2024, 12:23:37 am (UTC+00:00)
+October 20th 2024, 12:23:58 am (UTC+00:00)
October 13th 2024, 12:23:46 am (UTC+00:00)
+October 20th 2024, 12:24:07 am (UTC+00:00)
October 13th 2024, 12:21:36 am (UTC+00:00)
+October 20th 2024, 12:21:57 am (UTC+00:00)
October 13th 2024, 12:21:42 am (UTC+00:00)
+October 20th 2024, 12:22:05 am (UTC+00:00)
October 13th 2024, 12:21:47 am (UTC+00:00)
+October 20th 2024, 12:22:09 am (UTC+00:00)
October 13th 2024, 12:24:28 am (UTC+00:00)
+October 20th 2024, 12:22:13 am (UTC+00:00)
October 13th 2024, 12:22:08 am (UTC+00:00)
+October 20th 2024, 12:22:29 am (UTC+00:00)
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
- See How to fix?
for Ubuntu:24.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
-There is no fixed version for Ubuntu:24.04
openssl
.
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
+ See How to fix?
for Ubuntu:24.04
relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
+There is no fixed version for Ubuntu:24.04
openssl
.
October 13th 2024, 12:24:48 am (UTC+00:00)
+October 20th 2024, 12:22:33 am (UTC+00:00)