mirror of
https://github.com/rocky-linux/sig-cloud-instance-images.git
synced 2024-12-20 16:18:29 +00:00
deploy: 4fcb0f39f5
This commit is contained in:
parent
12a05d736f
commit
4ab4f67d47
10
index.html
10
index.html
@ -51,7 +51,7 @@
|
|||||||
}
|
}
|
||||||
a.toggle-more-links { cursor: pointer; }
|
a.toggle-more-links { cursor: pointer; }
|
||||||
</style>
|
</style>
|
||||||
<title>docker.io/rockylinux/rockylinux:8 (rocky 8.6) - Trivy Report - 2022-10-30 13:11:44.51382869 +0000 UTC m=+0.740525543 </title>
|
<title>docker.io/rockylinux/rockylinux:8 (rocky 8.6) - Trivy Report - 2022-10-31 13:15:55.505097542 +0000 UTC m=+0.700304244 </title>
|
||||||
<script>
|
<script>
|
||||||
window.onload = function() {
|
window.onload = function() {
|
||||||
document.querySelectorAll('td.links').forEach(function(linkCell) {
|
document.querySelectorAll('td.links').forEach(function(linkCell) {
|
||||||
@ -81,7 +81,7 @@
|
|||||||
</script>
|
</script>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<h1>docker.io/rockylinux/rockylinux:8 (rocky 8.6) - Trivy Report - 2022-10-30 13:11:44.51387219 +0000 UTC m=+0.740568943</h1>
|
<h1>docker.io/rockylinux/rockylinux:8 (rocky 8.6) - Trivy Report - 2022-10-31 13:15:55.505129743 +0000 UTC m=+0.700336345</h1>
|
||||||
<table>
|
<table>
|
||||||
<tr class="group-header"><th colspan="6">rocky</th></tr>
|
<tr class="group-header"><th colspan="6">rocky</th></tr>
|
||||||
<tr class="sub-header">
|
<tr class="sub-header">
|
||||||
@ -99,6 +99,7 @@
|
|||||||
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
||||||
<td>7.61.1-22.el8_6.4</td>
|
<td>7.61.1-22.el8_6.4</td>
|
||||||
<td class="links" data-more-links="off">
|
<td class="links" data-more-links="off">
|
||||||
|
<a href="http://seclists.org/fulldisclosure/2022/Oct/41">http://seclists.org/fulldisclosure/2022/Oct/41</a>
|
||||||
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
||||||
@ -128,6 +129,7 @@
|
|||||||
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
||||||
<td>7.61.1-22.el8_6.4</td>
|
<td>7.61.1-22.el8_6.4</td>
|
||||||
<td class="links" data-more-links="off">
|
<td class="links" data-more-links="off">
|
||||||
|
<a href="http://seclists.org/fulldisclosure/2022/Oct/41">http://seclists.org/fulldisclosure/2022/Oct/41</a>
|
||||||
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
||||||
@ -219,6 +221,7 @@
|
|||||||
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
||||||
<td>7.61.1-22.el8_6.4</td>
|
<td>7.61.1-22.el8_6.4</td>
|
||||||
<td class="links" data-more-links="off">
|
<td class="links" data-more-links="off">
|
||||||
|
<a href="http://seclists.org/fulldisclosure/2022/Oct/41">http://seclists.org/fulldisclosure/2022/Oct/41</a>
|
||||||
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
||||||
@ -248,6 +251,7 @@
|
|||||||
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
<td class="pkg-version">7.61.1-22.el8_6.3</td>
|
||||||
<td>7.61.1-22.el8_6.4</td>
|
<td>7.61.1-22.el8_6.4</td>
|
||||||
<td class="links" data-more-links="off">
|
<td class="links" data-more-links="off">
|
||||||
|
<a href="http://seclists.org/fulldisclosure/2022/Oct/41">http://seclists.org/fulldisclosure/2022/Oct/41</a>
|
||||||
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
<a href="https://access.redhat.com/errata/RHSA-2022:6157">https://access.redhat.com/errata/RHSA-2022:6157</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json</a>
|
||||||
@ -474,6 +478,7 @@
|
|||||||
<td class="pkg-version">2:8.0.1763-19.el8_6.2</td>
|
<td class="pkg-version">2:8.0.1763-19.el8_6.2</td>
|
||||||
<td>2:8.0.1763-19.el8_6.4</td>
|
<td>2:8.0.1763-19.el8_6.4</td>
|
||||||
<td class="links" data-more-links="off">
|
<td class="links" data-more-links="off">
|
||||||
|
<a href="http://seclists.org/fulldisclosure/2022/Oct/41">http://seclists.org/fulldisclosure/2022/Oct/41</a>
|
||||||
<a href="https://access.redhat.com/errata/RHSA-2022:5942">https://access.redhat.com/errata/RHSA-2022:5942</a>
|
<a href="https://access.redhat.com/errata/RHSA-2022:5942">https://access.redhat.com/errata/RHSA-2022:5942</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json</a>
|
||||||
@ -529,6 +534,7 @@
|
|||||||
<td class="pkg-version">2:8.0.1763-19.el8_6.2</td>
|
<td class="pkg-version">2:8.0.1763-19.el8_6.2</td>
|
||||||
<td>2:8.0.1763-19.el8_6.4</td>
|
<td>2:8.0.1763-19.el8_6.4</td>
|
||||||
<td class="links" data-more-links="off">
|
<td class="links" data-more-links="off">
|
||||||
|
<a href="http://seclists.org/fulldisclosure/2022/Oct/41">http://seclists.org/fulldisclosure/2022/Oct/41</a>
|
||||||
<a href="https://access.redhat.com/errata/RHSA-2022:5942">https://access.redhat.com/errata/RHSA-2022:5942</a>
|
<a href="https://access.redhat.com/errata/RHSA-2022:5942">https://access.redhat.com/errata/RHSA-2022:5942</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1785.json</a>
|
||||||
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json</a>
|
<a href="https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json">https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1897.json</a>
|
||||||
|
Loading…
Reference in New Issue
Block a user