deploy: 406ed2bfb0450fdcf8b1dbe3fc2e1d5aef8d831d

This commit is contained in:
j0nnymoe 2021-12-14 14:00:06 +00:00
parent f3bf67af7e
commit fdca939464
30 changed files with 86 additions and 70 deletions

File diff suppressed because one or more lines are too long

View File

@ -1 +1 @@
{"is":"system","title":"deluge","permalink":"https://info.linuxserver.io/affected/deluge/","status":"ok","pages":[{"is":"issue","title":"New Container: Deluge","createdAt":"2015-10-15 00:00:00 +0000 UTC","lastMod":"2021-07-03 00:52:41 +0200 +0200","permalink":"https://info.linuxserver.io/issues/2015-10-15-deluge/","severity":"<no value>","resolved":false,"informational":true,"resolvedAt":"<no value>","affected":["New Containers","deluge"],"filename":"2015-10-15-deluge.md"}]}
{"is":"system","title":"deluge","permalink":"https://info.linuxserver.io/affected/deluge/","status":"notice","pages":[{"is":"issue","title":"Known Issue: Deluge 2.0.4","createdAt":"2021-12-14 14:00:00 +0000 UTC","lastMod":"2021-12-14 13:57:22 +0000 UTC","permalink":"https://info.linuxserver.io/issues/2021-12-14-deluge/","severity":"notice","resolved":false,"informational":false,"resolvedAt":"<no value>","affected":["Known Issues","deluge"],"filename":"2021-12-14-deluge.md"},{"is":"issue","title":"New Container: Deluge","createdAt":"2015-10-15 00:00:00 +0000 UTC","lastMod":"2021-07-03 00:52:41 +0200 +0200","permalink":"https://info.linuxserver.io/issues/2015-10-15-deluge/","severity":"<no value>","resolved":false,"informational":true,"resolvedAt":"<no value>","affected":["New Containers","deluge"],"filename":"2015-10-15-deluge.md"}]}

View File

@ -1,4 +1,4 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><link rel="alternate" type="text/html" href="https://info.linuxserver.io"/><title>deluge on Info :: LinuxServer.io</title><link>https://info.linuxserver.io/affected/deluge/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>2015-10-15T00:00:00+00:00</lastBuildDate><updated>2015-10-15T00:00:00+00:00</updated><atom:link href="https://info.linuxserver.io/affected/deluge/index.xml" rel="self" type="application/rss+xml"/><item><title>New Container: Deluge</title><link>https://info.linuxserver.io/issues/2015-10-15-deluge/</link><pubDate>Thu, 15 Oct 2015 00:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2015-10-15-deluge/</guid><category/><description>We have released a new container for Deluge!
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><link rel="alternate" type="text/html" href="https://info.linuxserver.io"/><title>deluge on Info :: LinuxServer.io</title><link>https://info.linuxserver.io/affected/deluge/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>2021-12-14T14:00:00+00:00</lastBuildDate><updated>2021-12-14T14:00:00+00:00</updated><atom:link href="https://info.linuxserver.io/affected/deluge/index.xml" rel="self" type="application/rss+xml"/><item><title>Known Issue: Deluge 2.0.4</title><link>https://info.linuxserver.io/issues/2021-12-14-deluge/</link><pubDate>Tue, 14 Dec 2021 14:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-14-deluge/</guid><category/><description>An upstream issue with delgue-web in version 2.0.4 has broken the deluge webui for users. Please roll back to the version-2.0.3-2201906121747ubuntu18.04.1 tag until a fix is published.</description><content type="html">&lt;p>An upstream issue with delgue-web in version 2.0.4 has broken the deluge webui for users. Please roll back to the &lt;code>version-2.0.3-2201906121747ubuntu18.04.1&lt;/code> tag until a fix is published.&lt;/p></content></item><item><title>New Container: Deluge</title><link>https://info.linuxserver.io/issues/2015-10-15-deluge/</link><pubDate>Thu, 15 Oct 2015 00:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2015-10-15-deluge/</guid><category/><description>We have released a new container for Deluge!
Deluge is a lightweight, Free Software, cross-platform BitTorrent client.
Full Encryption WebUI Plugin System Much more&amp;hellip;</description><content type="html">&lt;p>We have released a new container for &lt;a href="https://github.com/linuxserver/docker-deluge">Deluge&lt;/a>!&lt;/p>
&lt;p>&lt;a href="http://deluge-torrent.org/">Deluge&lt;/a> is a lightweight, Free Software, cross-platform BitTorrent client.&lt;/p>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -1 +1 @@
{"is":"system","title":"Known Issues","permalink":"https://info.linuxserver.io/affected/known-issues/","status":"ok","pages":[{"is":"issue","title":"Known Issue: Paperless-ng","createdAt":"2021-07-26 00:00:00 +0000 UTC","lastMod":"2021-08-29 12:06:57 +0200 +0200","permalink":"https://info.linuxserver.io/issues/2021-07-26-paperless-ng/","severity":"notice","resolved":true,"informational":false,"resolvedAt":"2021-07-30","affected":["Known Issues","paperless-ng"],"filename":"2021-07-26-paperless-ng.md"},{"is":"issue","title":"Known Issue: Swag 1.15.0","createdAt":"2021-05-29 00:00:00 +0000 UTC","lastMod":"2021-06-02 20:51:38 +0100 +0100","permalink":"https://info.linuxserver.io/issues/2021-05-29-swag/","severity":"notice","resolved":true,"informational":false,"resolvedAt":"2021-06-02","affected":["Known Issues","swag"],"filename":"2021-05-29-swag.md"},{"is":"issue","title":"Known Issue: Unifi Controller v6.2.23","createdAt":"2021-05-08 00:00:00 +0000 UTC","lastMod":"2021-05-26 18:55:34 +0100 +0100","permalink":"https://info.linuxserver.io/issues/2021-05-13-unifi-controller/","severity":"notice","resolved":true,"informational":false,"resolvedAt":"2021-05-14","affected":["Known Issues","unifi-controller"],"filename":"2021-05-13-unifi-controller.md"}]}
{"is":"system","title":"Known Issues","permalink":"https://info.linuxserver.io/affected/known-issues/","status":"notice","pages":[{"is":"issue","title":"Known Issue: Deluge 2.0.4","createdAt":"2021-12-14 14:00:00 +0000 UTC","lastMod":"2021-12-14 13:57:22 +0000 UTC","permalink":"https://info.linuxserver.io/issues/2021-12-14-deluge/","severity":"notice","resolved":false,"informational":false,"resolvedAt":"<no value>","affected":["Known Issues","deluge"],"filename":"2021-12-14-deluge.md"},{"is":"issue","title":"Known Issue: Paperless-ng","createdAt":"2021-07-26 00:00:00 +0000 UTC","lastMod":"2021-08-29 12:06:57 +0200 +0200","permalink":"https://info.linuxserver.io/issues/2021-07-26-paperless-ng/","severity":"notice","resolved":true,"informational":false,"resolvedAt":"2021-07-30","affected":["Known Issues","paperless-ng"],"filename":"2021-07-26-paperless-ng.md"},{"is":"issue","title":"Known Issue: Swag 1.15.0","createdAt":"2021-05-29 00:00:00 +0000 UTC","lastMod":"2021-06-02 20:51:38 +0100 +0100","permalink":"https://info.linuxserver.io/issues/2021-05-29-swag/","severity":"notice","resolved":true,"informational":false,"resolvedAt":"2021-06-02","affected":["Known Issues","swag"],"filename":"2021-05-29-swag.md"},{"is":"issue","title":"Known Issue: Unifi Controller v6.2.23","createdAt":"2021-05-08 00:00:00 +0000 UTC","lastMod":"2021-05-26 18:55:34 +0100 +0100","permalink":"https://info.linuxserver.io/issues/2021-05-13-unifi-controller/","severity":"notice","resolved":true,"informational":false,"resolvedAt":"2021-05-14","affected":["Known Issues","unifi-controller"],"filename":"2021-05-13-unifi-controller.md"}]}

View File

@ -1,4 +1,4 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><link rel="alternate" type="text/html" href="https://info.linuxserver.io"/><title>Known Issues on Info :: LinuxServer.io</title><link>https://info.linuxserver.io/affected/known-issues/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>2021-07-26T00:00:00+00:00</lastBuildDate><updated>2021-07-26T00:00:00+00:00</updated><atom:link href="https://info.linuxserver.io/affected/known-issues/index.xml" rel="self" type="application/rss+xml"/><item><title>[Resolved] Known Issue: Paperless-ng</title><link>https://info.linuxserver.io/issues/2021-07-26-paperless-ng/</link><pubDate>Mon, 26 Jul 2021 00:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-07-26-paperless-ng/</guid><category>2021-07-30</category><description>The initial release of our paperless-ng container did not correctly map the contents of /config with the config mount point. We are pushing an update to correct this issue, however, users will need to manually copy out their configuration files or else there will be data loss. You copy out all necessary files by running the following command:
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><link rel="alternate" type="text/html" href="https://info.linuxserver.io"/><title>Known Issues on Info :: LinuxServer.io</title><link>https://info.linuxserver.io/affected/known-issues/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>2021-12-14T14:00:00+00:00</lastBuildDate><updated>2021-12-14T14:00:00+00:00</updated><atom:link href="https://info.linuxserver.io/affected/known-issues/index.xml" rel="self" type="application/rss+xml"/><item><title>Known Issue: Deluge 2.0.4</title><link>https://info.linuxserver.io/issues/2021-12-14-deluge/</link><pubDate>Tue, 14 Dec 2021 14:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-14-deluge/</guid><category/><description>An upstream issue with delgue-web in version 2.0.4 has broken the deluge webui for users. Please roll back to the version-2.0.3-2201906121747ubuntu18.04.1 tag until a fix is published.</description><content type="html">&lt;p>An upstream issue with delgue-web in version 2.0.4 has broken the deluge webui for users. Please roll back to the &lt;code>version-2.0.3-2201906121747ubuntu18.04.1&lt;/code> tag until a fix is published.&lt;/p></content></item><item><title>[Resolved] Known Issue: Paperless-ng</title><link>https://info.linuxserver.io/issues/2021-07-26-paperless-ng/</link><pubDate>Mon, 26 Jul 2021 00:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-07-26-paperless-ng/</guid><category>2021-07-30</category><description>The initial release of our paperless-ng container did not correctly map the contents of /config with the config mount point. We are pushing an update to correct this issue, however, users will need to manually copy out their configuration files or else there will be data loss. You copy out all necessary files by running the following command:
docker cp paperless-ng:/app/paperless/data/db.sqlite3 . This will copy the existing database to your current working directory.</description><content type="html">&lt;p>The initial release of our paperless-ng container did not correctly map the contents of /config with the config mount point. We are pushing an update to correct this issue, however, users will need to manually copy out their configuration files or else there will be data loss. You copy out all necessary files by running the following command:&lt;/p>
&lt;pre>&lt;code>docker cp paperless-ng:/app/paperless/data/db.sqlite3 .
&lt;/code>&lt;/pre>&lt;p>This will copy the existing database to your current working directory. You can then safely place this file into the /config mount of paperless-ng and safely update.&lt;/p></content></item><item><title>[Resolved] Known Issue: Swag 1.15.0</title><link>https://info.linuxserver.io/issues/2021-05-29-swag/</link><pubDate>Sat, 29 May 2021 00:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-05-29-swag/</guid><category>2021-06-02</category><description>Version 1.16 has been released to resolve this issue.

View File

@ -7,13 +7,15 @@
<span class=tooltip__text>Information regarding our images</span></span>
<span class=category-status></span></div><div class=components><div class=component data-status=ok><a href=/affected/deprecations/ class=no-underline>Deprecations</a>
<span class=component-status>OK</span></div><div class=component data-status=ok><a href=/affected/new-containers/ class=no-underline>New Containers</a>
<span class=component-status>OK</span></div><div class=component data-status=ok><a href=/affected/known-issues/ class=no-underline>Known Issues</a>
<span class=component-status>OK</span></div></div><script>var highlestLevelStatus,highlestLevelStatusReadable;thisCategory=document.currentScript.parentNode,componentsOfThisCategory=thisCategory.querySelectorAll('.component'),highlestLevelStatus='';function checkStatus(b){var a=b.getAttribute('data-status');a==='down'?highlestLevelStatus='down':a==='disrupted'&&highlestLevelStatus!=='down'?highlestLevelStatus='disrupted':a==='notice'&&highlestLevelStatus!=='down'&&highlestLevelStatus!=='disrupted'&&(highlestLevelStatus='notice')}componentsOfThisCategory.forEach(a=>checkStatus(a)),highlestLevelStatusReadable=highlestLevelStatus,highlestLevelStatus==='ok'&&(highlestLevelStatusReadable='OK'),highlestLevelStatus==='notice'&&(highlestLevelStatusReadable='Notice'),highlestLevelStatus==='dsirupted'&&(highlestLevelStatusReadable='Disrupted'),highlestLevelStatus==='down'&&(highlestLevelStatusReadable='Down'),thisCategory.classList.contains('category--titled')&&(thisCategory.querySelector('.category__head').setAttribute('data-status',highlestLevelStatus),thisCategory.querySelector('.category-status').innerHTML=highlestLevelStatusReadable)</script></div><div class="category category--open category--titled" id=security><div class="bold padding clicky category__head" onclick=toggleCategoryHead(this)><span class=hide-without-js><span class=category__closed-marker></span>
<span class=component-status>OK</span></div><div class=component data-status=notice><a href=/affected/known-issues/ class=no-underline>Known Issues</a>
<span class=component-status>Notice</span></div></div><script>var highlestLevelStatus,highlestLevelStatusReadable;thisCategory=document.currentScript.parentNode,componentsOfThisCategory=thisCategory.querySelectorAll('.component'),highlestLevelStatus='';function checkStatus(b){var a=b.getAttribute('data-status');a==='down'?highlestLevelStatus='down':a==='disrupted'&&highlestLevelStatus!=='down'?highlestLevelStatus='disrupted':a==='notice'&&highlestLevelStatus!=='down'&&highlestLevelStatus!=='disrupted'&&(highlestLevelStatus='notice')}componentsOfThisCategory.forEach(a=>checkStatus(a)),highlestLevelStatusReadable=highlestLevelStatus,highlestLevelStatus==='ok'&&(highlestLevelStatusReadable='OK'),highlestLevelStatus==='notice'&&(highlestLevelStatusReadable='Notice'),highlestLevelStatus==='dsirupted'&&(highlestLevelStatusReadable='Disrupted'),highlestLevelStatus==='down'&&(highlestLevelStatusReadable='Down'),thisCategory.classList.contains('category--titled')&&(thisCategory.querySelector('.category__head').setAttribute('data-status',highlestLevelStatus),thisCategory.querySelector('.category-status').innerHTML=highlestLevelStatusReadable)</script></div><div class="category category--open category--titled" id=security><div class="bold padding clicky category__head" onclick=toggleCategoryHead(this)><span class=hide-without-js><span class=category__closed-marker></span>
<span class=category__open-marker></span></span>
<b>Security</b>
<span class=category-status></span></div><div class=components><div class=component data-status=notice><a href=/affected/vulnerabilities/ class=no-underline>Vulnerabilities</a>
<span class=component-status>Notice</span></div></div><script>var highlestLevelStatus,highlestLevelStatusReadable;thisCategory=document.currentScript.parentNode,componentsOfThisCategory=thisCategory.querySelectorAll('.component'),highlestLevelStatus='';function checkStatus(b){var a=b.getAttribute('data-status');a==='down'?highlestLevelStatus='down':a==='disrupted'&&highlestLevelStatus!=='down'?highlestLevelStatus='disrupted':a==='notice'&&highlestLevelStatus!=='down'&&highlestLevelStatus!=='disrupted'&&(highlestLevelStatus='notice')}componentsOfThisCategory.forEach(a=>checkStatus(a)),highlestLevelStatusReadable=highlestLevelStatus,highlestLevelStatus==='ok'&&(highlestLevelStatusReadable='OK'),highlestLevelStatus==='notice'&&(highlestLevelStatusReadable='Notice'),highlestLevelStatus==='dsirupted'&&(highlestLevelStatusReadable='Disrupted'),highlestLevelStatus==='down'&&(highlestLevelStatusReadable='Down'),thisCategory.classList.contains('category--titled')&&(thisCategory.querySelector('.category__head').setAttribute('data-status',highlestLevelStatus),thisCategory.querySelector('.category-status').innerHTML=highlestLevelStatusReadable)</script></div></div></div><div class="contain contain--more"><h2 class=center>History</h2><hr class=clean></div><div class="contain contain--more" id=incidents><p class="center archive__head" id=archive-2021><a href=#archive-2021 class=no-underline><strong>2021</strong>
<span class=faded>(33)</span></a></p><a href=https://info.linuxserver.io/issues/2021-12-13-log4j/ class="issue no-underline"><small class="date float-right relative-time" title="Dec 13 15:00:00 2021 UTC">December 13, 2021 at 3:00 PM</small><h3>log4j Vulnerability</h3><strong class=warning>
<span class=faded>(34)</span></a></p><a href=https://info.linuxserver.io/issues/2021-12-14-deluge/ class="issue no-underline"><small class="date float-right relative-time" title="Dec 14 14:00:00 2021 UTC">December 14, 2021 at 2:00 PM</small><h3>Known Issue: Deluge 2.0.4</h3><strong class=warning>
This issue is not resolved yet</strong></a>
<a href=https://info.linuxserver.io/issues/2021-12-13-log4j/ class="issue no-underline"><small class="date float-right relative-time" title="Dec 13 15:00:00 2021 UTC">December 13, 2021 at 3:00 PM</small><h3>log4j Vulnerability</h3><strong class=warning>
This issue is not resolved yet</strong></a>
<a href=https://info.linuxserver.io/issues/2021-11-29-openvscode-server/ class="issue no-underline"><small class="date float-right relative-time" title="Nov 29 00:00:00 2021 UTC">November 29, 2021 at 12:00 AM</small><h3>New Container: OpenVSCode Server &nbsp;</h3><span class=faded>We have released a new container for OpenVSCode Server!
OpenVSCode Server provides a version of VS Code that runs a server on a remote machine and allows access through a modern web browser.</span></a>

View File

@ -1 +1 @@
{"is":"index","cStateVersion":"5.2","apiVersion":"2.0","title":"Info :: LinuxServer.io","languageCodeHTML":"en","languageCode":"en","baseURL":"https://info.linuxserver.io","description":"<no value>","summaryStatus":"notice","categories":[{"name":"Images","description":"Information regarding our images","hideTitle":false,"closedByDefault":false},{"name":"Security","hideTitle":false,"closedByDefault":false}],"systems":[{"name":"Deprecations","category":"Images","status":"ok","unresolvedIssues":[]},{"name":"New Containers","category":"Images","status":"ok","unresolvedIssues":[]},{"name":"Vulnerabilities","category":"Security","status":"notice","unresolvedIssues":[{"is":"issue","title":"log4j Vulnerability","createdAt":"2021-12-13 15:00:00 +0000 UTC","lastMod":"2021-12-14 09:35:55 +0000 UTC","permalink":"https://info.linuxserver.io/issues/2021-12-13-log4j/","severity":"notice","resolved":false,"informational":false,"resolvedAt":"<no value>","affected":["Vulnerabilities","unifi-controller","booksonic-air","fleet","airsonic","habridge","nzbhydra2","davos","booksonic","ubooquity"],"filename":"2021-12-13-log4j.md"}]},{"name":"Known Issues","category":"Images","status":"ok","unresolvedIssues":[]}],"buildDate":"2021-12-14","buildTime":"09:38","buildTimezone":"UTC","colorBrand":"#0a0c0f","colorOk":"#008000","colorDisrupted":"#cc4400","colorDown":"#e60000","colorNotice":"#24478f","alwaysKeepBrandColor":"true","logo":"https://info.linuxserver.io/logo.png","googleAnalytics":"UA-00000000-1"}
{"is":"index","cStateVersion":"5.2","apiVersion":"2.0","title":"Info :: LinuxServer.io","languageCodeHTML":"en","languageCode":"en","baseURL":"https://info.linuxserver.io","description":"<no value>","summaryStatus":"notice","categories":[{"name":"Images","description":"Information regarding our images","hideTitle":false,"closedByDefault":false},{"name":"Security","hideTitle":false,"closedByDefault":false}],"systems":[{"name":"Deprecations","category":"Images","status":"ok","unresolvedIssues":[]},{"name":"New Containers","category":"Images","status":"ok","unresolvedIssues":[]},{"name":"Vulnerabilities","category":"Security","status":"notice","unresolvedIssues":[{"is":"issue","title":"log4j Vulnerability","createdAt":"2021-12-13 15:00:00 +0000 UTC","lastMod":"2021-12-14 09:35:55 +0000 UTC","permalink":"https://info.linuxserver.io/issues/2021-12-13-log4j/","severity":"notice","resolved":false,"informational":false,"resolvedAt":"<no value>","affected":["Vulnerabilities","unifi-controller","booksonic-air","fleet","airsonic","habridge","nzbhydra2","davos","booksonic","ubooquity"],"filename":"2021-12-13-log4j.md"}]},{"name":"Known Issues","category":"Images","status":"notice","unresolvedIssues":[{"is":"issue","title":"Known Issue: Deluge 2.0.4","createdAt":"2021-12-14 14:00:00 +0000 UTC","lastMod":"2021-12-14 13:57:22 +0000 UTC","permalink":"https://info.linuxserver.io/issues/2021-12-14-deluge/","severity":"notice","resolved":false,"informational":false,"resolvedAt":"<no value>","affected":["Known Issues","deluge"],"filename":"2021-12-14-deluge.md"}]}],"buildDate":"2021-12-14","buildTime":"14:00","buildTimezone":"UTC","colorBrand":"#0a0c0f","colorOk":"#008000","colorDisrupted":"#cc4400","colorDown":"#e60000","colorNotice":"#24478f","alwaysKeepBrandColor":"true","logo":"https://info.linuxserver.io/logo.png","googleAnalytics":"UA-00000000-1"}

View File

@ -1,4 +1,4 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Info :: LinuxServer.io</title><link>https://info.linuxserver.io/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>Mon, 13 Dec 2021 15:00:00 +0000</lastBuildDate><atom:link href="https://info.linuxserver.io/index.xml" rel="self" type="application/rss+xml"/><item><title>log4j Vulnerability</title><link>https://info.linuxserver.io/issues/2021-12-13-log4j/</link><pubDate>Mon, 13 Dec 2021 15:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-13-log4j/</guid><category/><description>&lt;p>A &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">vulnerability&lt;/a> has been discovered in log4j which can lead to denial of service and remote code execution. The following Linuxserver containers have been confirmed not to be affected by this vulnerability due to existing mitigations, upstream patches, or workarounds applied to the container images.&lt;/p>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Info :: LinuxServer.io</title><link>https://info.linuxserver.io/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>Tue, 14 Dec 2021 14:00:00 +0000</lastBuildDate><atom:link href="https://info.linuxserver.io/index.xml" rel="self" type="application/rss+xml"/><item><title>Known Issue: Deluge 2.0.4</title><link>https://info.linuxserver.io/issues/2021-12-14-deluge/</link><pubDate>Tue, 14 Dec 2021 14:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-14-deluge/</guid><category/><description>&lt;p>An upstream issue with delgue-web in version 2.0.4 has broken the deluge webui for users. Please roll back to the &lt;code>version-2.0.3-2201906121747ubuntu18.04.1&lt;/code> tag until a fix is published.&lt;/p></description></item><item><title>log4j Vulnerability</title><link>https://info.linuxserver.io/issues/2021-12-13-log4j/</link><pubDate>Mon, 13 Dec 2021 15:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-13-log4j/</guid><category/><description>&lt;p>A &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">vulnerability&lt;/a> has been discovered in log4j which can lead to denial of service and remote code execution. The following Linuxserver containers have been confirmed not to be affected by this vulnerability due to existing mitigations, upstream patches, or workarounds applied to the container images.&lt;/p>
&lt;p>&lt;strong>Please note this applies to the latest versions of the below images &lt;em>only&lt;/em>. If you are running older versions they may still be vulnerable.&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>&lt;a href="https://github.com/linuxserver/docker-unifi-controller">Unifi Controller&lt;/a> (Workaround applied + upstream fix)&lt;/li>

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1 @@
{"is":"issue","title":"Known Issue: Deluge 2.0.4","createdAt":"2021-12-14 14:00:00 +0000 UTC","lastMod":"2021-12-14 13:57:22 +0000 UTC","permalink":"https://info.linuxserver.io/issues/2021-12-14-deluge/","severity":"notice","resolved":false,"informational":false,"resolvedAt":"<no value>","affected":["Known Issues","deluge"],"filename":"2021-12-14-deluge.md"}

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -1,4 +1,4 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><link rel="alternate" type="text/html" href="https://info.linuxserver.io"/><title>Issues on Info :: LinuxServer.io</title><link>https://info.linuxserver.io/issues/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>2021-12-13T15:00:00+00:00</lastBuildDate><updated>2021-12-13T15:00:00+00:00</updated><atom:link href="https://info.linuxserver.io/issues/index.xml" rel="self" type="application/rss+xml"/><item><title>log4j Vulnerability</title><link>https://info.linuxserver.io/issues/2021-12-13-log4j/</link><pubDate>Mon, 13 Dec 2021 15:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-13-log4j/</guid><category/><description>A vulnerability has been discovered in log4j which can lead to denial of service and remote code execution. The following Linuxserver containers have been confirmed not to be affected by this vulnerability due to existing mitigations, upstream patches, or workarounds applied to the container images.
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><link rel="alternate" type="text/html" href="https://info.linuxserver.io"/><title>Issues on Info :: LinuxServer.io</title><link>https://info.linuxserver.io/issues/</link><description>History</description><generator>github.com/cstate</generator><language>en</language><lastBuildDate>2021-12-14T14:00:00+00:00</lastBuildDate><updated>2021-12-14T14:00:00+00:00</updated><atom:link href="https://info.linuxserver.io/issues/index.xml" rel="self" type="application/rss+xml"/><item><title>Known Issue: Deluge 2.0.4</title><link>https://info.linuxserver.io/issues/2021-12-14-deluge/</link><pubDate>Tue, 14 Dec 2021 14:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-14-deluge/</guid><category/><description>An upstream issue with delgue-web in version 2.0.4 has broken the deluge webui for users. Please roll back to the version-2.0.3-2201906121747ubuntu18.04.1 tag until a fix is published.</description><content type="html">&lt;p>An upstream issue with delgue-web in version 2.0.4 has broken the deluge webui for users. Please roll back to the &lt;code>version-2.0.3-2201906121747ubuntu18.04.1&lt;/code> tag until a fix is published.&lt;/p></content></item><item><title>log4j Vulnerability</title><link>https://info.linuxserver.io/issues/2021-12-13-log4j/</link><pubDate>Mon, 13 Dec 2021 15:00:00 +0000</pubDate><guid>https://info.linuxserver.io/issues/2021-12-13-log4j/</guid><category/><description>A vulnerability has been discovered in log4j which can lead to denial of service and remote code execution. The following Linuxserver containers have been confirmed not to be affected by this vulnerability due to existing mitigations, upstream patches, or workarounds applied to the container images.
Please note this applies to the latest versions of the below images only. If you are running older versions they may still be vulnerable.
Unifi Controller (Workaround applied + upstream fix) Booksonic Air (Upstream fix) Fleet (Workaround applied + upstream fix) Airsonic (No log4j-core in use) HABridge (No log4j-core in use) nzbhydra2 (Upstream fix) The following Linuxserver containers are known to be using a vulnerable version of log4j (again this applies to the latest version only).</description><content type="html">&lt;p>A &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">vulnerability&lt;/a> has been discovered in log4j which can lead to denial of service and remote code execution. The following Linuxserver containers have been confirmed not to be affected by this vulnerability due to existing mitigations, upstream patches, or workarounds applied to the container images.&lt;/p>
&lt;p>&lt;strong>Please note this applies to the latest versions of the below images &lt;em>only&lt;/em>. If you are running older versions they may still be vulnerable.&lt;/strong>&lt;/p>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long