profile
viewpoint
Michael Gebetsroither gebi @mgit-at Graz

gebi/check-receiver 9

Daemon to receive nagios/icinga/check-mk results pushed through https/http

gebi/debianpaste-clients 8

Client for paste.debian.net Service

gebi/checkmk-agent-hp 6

Check_MK agent plugins for HP Servers - DORMANT

gebi/fs-test 6

Filesystem semantic checker

gebi/co2exporter 5

Prometheus exporter for co2 sensors

gebi/checkmk 3

Check_MK plugin repository.

gebi/eunit 3

Git tracking branch of EUnit, a unit testing framework for Erlang

gebi/container-zoo 2

Various Dockerfiles i use or used

gebi/dirvish-stats 2

Efficiently determining used diskspace from hardlinked dirvish backups with persistent cache

PR opened BiteDasher/archbashstrap

update image list for install/chroot to work

thx for your awesome tool, was the easiest one to get an arch running under debian unstable! :+1:

i just needed to update the package liste with the cmds provided in your readme (i used the archlinux:base-devel docker container for it) and then installation worked.

before it gave an error that package hwids was missing.

+5 -3

0 comment

1 changed file

pr created time in 15 hours

push eventgebi/archbashstrap

Michael Gebetsroither

commit sha c6ca4591aa43fb7653521d282abb2c4ce7bec6bd

update image list for install/chroot to work

view details

push time in 15 hours

fork gebi/archbashstrap

Install/Bootstrap Arch Linux system without using pacman

fork in 15 hours

startedBiteDasher/archbashstrap

started time in 15 hours

issue commentStellarium/stellarium

Ocular aFoV does not change FoV shown

@alex-w sure, i've searched a bit for some representative image, and i think i found the image initially there https://www.bresser.de/Astronomie/Zubehoer/Okulare/EXPLORE-SCIENTIFIC-100-Ar-Okular-25mm-2.html

other tools

gebi

comment created time in 21 hours

issue openedStellarium/stellarium

Ocular aFoV does not change FoV shown

Expected Behaviour

i'm not sure how to report this, but it always felt the FoV (field of view) in stellarium ocular view was way off compared to my real telescopes. The Ocular aFoV also changes the FoV one can see through the ocular, eg. like this explore scientific showcase of aFoV for oculars

Actual Behaviour

In stellarium ocular view the real FoV does not change with different ocular aFoV, the image is only zoomed and the displayed FoV changes, but the piece of the sky shown does not change.

21mm 100deg 21mm 100deg

vs 21mm 50deg 21mm 50deg

What's also strange is, that the FOV display at the bottom shows 3.32grad for the 50deg ocular which is wrong, it's only 0.84deg (the 1.66deg shown for the 100deg ocular are correctly calculated but IMHO only half of the view seen in a real telescope is shown)

Steps to reproduce

create 2 oculars, with eg 21mm focal length and 36.2mm fieldstop

  1. 100deg aFoV
  2. 50deg aFoV

go to the orion nebular, activate ocular view and change between the 2 oculars to compare the views look at the stars to see the part of the sky shown.

(i've used a 10" dobson with 1250mm focal length and 250mm diameter, but it happens on every telescope here) (i've checked both the issues and changelog from 0.20.4 onwards to the latest version for changes that would fix this behaivour and have not found anything, thus this report).

System

  • Stellarium version: 0.20.4-3
  • Operating system: debian
  • Graphics Card: integrated intel
  • Screen type (if applicable): 32" 4k

Kudos

many thx for this awesome piece of software :smile: !!

created time in 3 days

startedsolo-io/bumblebee

started time in 9 days

issue commentClickHouse/ClickHouse

Request update to behaviour of `domain` and `toplevelDomain` functions for single labels.

we experienced the same behaviour of domain. In our case the behaviour of domain ignored all requests done on local machines where DNS searchpath was used for queries having domains/hostname of only foo or bar (and was a bit unexpected)

We thought about a function host with the same behaviour as domain but not requiring a contained . but did not think about all the oder functions where this distinction might be important.

saradickinson

comment created time in 11 days

push eventmgit-at/ansible-collection-mgssl

Michael Gebetsroither

commit sha 874888bea563d7f244aaeeb00795ba5f9e8407b6

Update LICENSE fix typo

view details

push time in a month

CommitCommentEvent

startedmgit-at/raspiECC

started time in a month

push eventmgit-at/ansible-collection-mgssl

Michael Gebetsroither

commit sha 37c0b06d88e1801ce627b151af78784a7b923f54

Update LICENSE

view details

push time in a month

push eventmgit-at/ansible-collection-roles

Michael Gebetsroither

commit sha 9665a5eefdb52f8b7fd6bbd6c1eefe01e39272fe

Update LICENSE

view details

push time in a month

push eventmgit-at/ansible-collection-roles

Michael Gebetsroither

commit sha 1e5d4422491a2b93cbfa93549ca20919a1aee62f

Update README.md

view details

push time in a month

PR closed gebi/ooopy

[Snyk] Security upgrade debian from buster-slim to 10.10-slim invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • Dockerfile

We recommend upgrading to debian:10.10-slim, as this image has only 59 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
high severity 500 Improper Input Validation <br/>SNYK-DEBIAN10-LIBIDN2-474100 No Known Exploit
high severity 500 Privilege Chaining <br/>SNYK-DEBIAN10-SYSTEMD-345386 No Known Exploit
high severity 500 Privilege Chaining <br/>SNYK-DEBIAN10-SYSTEMD-345386 No Known Exploit
high severity 500 Incorrect Privilege Assignment <br/>SNYK-DEBIAN10-SYSTEMD-345391 No Known Exploit
high severity 500 Incorrect Privilege Assignment <br/>SNYK-DEBIAN10-SYSTEMD-345391 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiI4OTExOGExYy1hYzE5LTQ3YzQtYmRmNi0yNzllMGUwZDMzYmYiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6Ijg5MTE4YTFjLWFjMTktNDdjNC1iZGY2LTI3OWUwZTBkMzNiZiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

startedmgit-at/ansible-collection-roles

started time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from focal to 20.04 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/20.04/Dockerfile

We recommend upgrading to ubuntu:20.04, as this image has only 14 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Issue Exploit Maturity
low severity Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
low severity Information Exposure <br/>SNYK-UBUNTU2004-LIBGCRYPT20-1297919 No Known Exploit
medium severity Use of a Broken or Risky Cryptographic Algorithm <br/>SNYK-UBUNTU2004-LIBGCRYPT20-1583851 No Known Exploit
low severity Time-of-check Time-of-use (TOCTOU) <br/>SNYK-UBUNTU2004-SHADOW-577863 No Known Exploit
low severity Time-of-check Time-of-use (TOCTOU) <br/>SNYK-UBUNTU2004-SHADOW-577863 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiIzZDAyZDllOS02ZjVlLTQ4YTQtOTM1OC02NmJmODk5ODIxYTIiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjNkMDJkOWU5LTZmNWUtNDhhNC05MzU4LTY2YmY4OTk4MjFhMiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from xenial to xenial-20210416 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/16.04/Dockerfile

We recommend upgrading to ubuntu:xenial-20210416, as this image has only 47 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU1604-BASH-542609 Mature
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiIzOGRkNzhiZC00ZDFmLTQ5MmYtYTAwOS1kYjA5Zjk3ZmE4OTEiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjM4ZGQ3OGJkLTRkMWYtNDkyZi1hMDA5LWRiMDlmOTdmYTg5MSJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from xenial to xenial-20210416 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/16.04/Dockerfile

We recommend upgrading to ubuntu:xenial-20210416, as this image has only 48 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 364 Authentication Bypass <br/>SNYK-UBUNTU1604-SYSTEMD-1298778 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJkNjJiNTAyNC01ZTBhLTRhZTMtYTMyNi02OTIxOTQwNDQ1MmIiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImQ2MmI1MDI0LTVlMGEtNGFlMy1hMzI2LTY5MjE5NDA0NDUyYiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from xenial to xenial-20210114 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/16.04/Dockerfile

We recommend upgrading to ubuntu:xenial-20210114, as this image has only 48 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 364 Authentication Bypass <br/>SNYK-UBUNTU1604-SYSTEMD-1298778 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit
high severity 833 CVE-2021-33910 <br/>SNYK-UBUNTU1604-SYSTEMD-1320131 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJlMzhkYTM4OS00ZGEyLTRmOGQtYTZlNC1kZGM1YTcyYzhkNTMiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImUzOGRhMzg5LTRkYTItNGY4ZC1hNmU0LWRkYzVhNzJjOGQ1MyJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from xenial to xenial-20210114 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/16.04/Dockerfile

We recommend upgrading to ubuntu:xenial-20210114, as this image has only 47 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU1604-BASH-542609 Mature
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU1604-SYSTEMD-346739 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJiZDM2NDc5My0wNDRkLTRkNmMtYmRlOS04ZjJkNDU5N2U3ZmIiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImJkMzY0NzkzLTA0NGQtNGQ2Yy1iZGU5LThmMmQ0NTk3ZTdmYiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from 20.04 to groovy-20210416 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • avif/20.04/Dockerfile

We recommend upgrading to ubuntu:groovy-20210416, as this image has only 18 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity 371 CVE-2020-13529 <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit
medium severity 371 CVE-2020-13529 <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiIwMzEzY2EzNS02MWNjLTRlMGEtYTY2Zi1iODQ3ZDIxMzRmNDYiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjAzMTNjYTM1LTYxY2MtNGUwYS1hNjZmLWI4NDdkMjEzNGY0NiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+2 -2

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from 20.04 to 20.10 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • avif/20.04/Dockerfile

We recommend upgrading to ubuntu:20.10, as this image has only 18 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity 371 CVE-2021-3580 <br/>SNYK-UBUNTU2004-NETTLE-1303240 No Known Exploit
medium severity 371 CVE-2021-3580 <br/>SNYK-UBUNTU2004-NETTLE-1303240 No Known Exploit
medium severity 300 Authentication Bypass <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit
medium severity 300 Authentication Bypass <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiI3ZjViNjA0OS02ZmI4LTRhM2ItODYwZC00Y2RiZDM2MTNkMjYiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjdmNWI2MDQ5LTZmYjgtNGEzYi04NjBkLTRjZGJkMzYxM2QyNiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+2 -2

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from focal to 20.10 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/20.04/Dockerfile

We recommend upgrading to ubuntu:20.10, as this image has only 18 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity 371 CVE-2021-3580 <br/>SNYK-UBUNTU2004-NETTLE-1303240 No Known Exploit
medium severity 371 CVE-2021-3580 <br/>SNYK-UBUNTU2004-NETTLE-1303240 No Known Exploit
medium severity 300 Authentication Bypass <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit
medium severity 300 Authentication Bypass <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiI2MzQxYmU3ZC1lNTczLTQzZWQtOWEwOC1jODMzNGI0MmY4YTkiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjYzNDFiZTdkLWU1NzMtNDNlZC05YTA4LWM4MzM0YjQyZjhhOSJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from 20.04 to groovy-20210614 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • avif/20.04/Dockerfile

We recommend upgrading to ubuntu:groovy-20210614, as this image has only 18 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity 371 CVE-2021-3580 <br/>SNYK-UBUNTU2004-NETTLE-1303240 No Known Exploit
medium severity 371 CVE-2021-3580 <br/>SNYK-UBUNTU2004-NETTLE-1303240 No Known Exploit
medium severity 300 Authentication Bypass <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit
medium severity 300 Authentication Bypass <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiI3YjdkZmM2OS0wZTk5LTRkN2MtYmY4Yi1iMmU0MDVhYWFkOGIiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjdiN2RmYzY5LTBlOTktNGQ3Yy1iZjhiLWIyZTQwNWFhYWQ4YiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+2 -2

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from focal to groovy-20210416 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/20.04/Dockerfile

We recommend upgrading to ubuntu:groovy-20210416, as this image has only 18 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity 371 CVE-2020-13529 <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit
medium severity 371 CVE-2020-13529 <br/>SNYK-UBUNTU2004-SYSTEMD-1290722 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiIzY2RiZjEyMS04MTAzLTQ1MDEtYmQ3NC03NWY1NDE0ZDQ2ZWYiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjNjZGJmMTIxLTgxMDMtNDUwMS1iZDc0LTc1ZjU0MTRkNDZlZiJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from 20.04 to 20.10 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • avif/20.04/Dockerfile

We recommend upgrading to ubuntu:20.10, as this image has only 16 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
low severity 150 Time-of-check Time-of-use (TOCTOU) <br/>SNYK-UBUNTU2004-SHADOW-577863 No Known Exploit
low severity 150 Time-of-check Time-of-use (TOCTOU) <br/>SNYK-UBUNTU2004-SHADOW-577863 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJiZDUwZmYyOS1mMGE1LTQ5ZDItYTZiYi00NzNiZjI2YmMxM2UiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImJkNTBmZjI5LWYwYTUtNDlkMi1hNmJiLTQ3M2JmMjZiYzEzZSJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+2 -2

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from 20.04 to groovy-20210325 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • avif/20.04/Dockerfile

We recommend upgrading to ubuntu:groovy-20210325, as this image has only 17 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity 371 Use of a Broken or Risky Cryptographic Algorithm <br/>SNYK-UBUNTU2004-NETTLE-1090728 No Known Exploit
medium severity 371 Use of a Broken or Risky Cryptographic Algorithm <br/>SNYK-UBUNTU2004-NETTLE-1090728 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJmMzAzN2E4ZS05MmQ3LTQzMjQtYjk2MS03MzRiYTRkNWI2MzEiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImYzMDM3YThlLTkyZDctNDMyNC1iOTYxLTczNGJhNGQ1YjYzMSJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+2 -2

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from focal to 20.10 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/20.04/Dockerfile

We recommend upgrading to ubuntu:20.10, as this image has only 16 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Issue Exploit Maturity
low severity Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity Use of a Broken or Risky Cryptographic Algorithm <br/>SNYK-UBUNTU2004-NETTLE-1090728 No Known Exploit
medium severity Use of a Broken or Risky Cryptographic Algorithm <br/>SNYK-UBUNTU2004-NETTLE-1090728 No Known Exploit
medium severity Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit
medium severity Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiIyYzlhZTU2YS0zMDhiLTQ3NWQtYTYyYS0yZjY3ZWUwYTZmNDciLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6IjJjOWFlNTZhLTMwOGItNDc1ZC1hNjJhLTJmNjdlZTBhNmY0NyJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

PR closed gebi/container-zoo

[Snyk] Security upgrade ubuntu from focal to groovy-20210325 invalid

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • ubuntu/20.04/Dockerfile

We recommend upgrading to ubuntu:groovy-20210325, as this image has only 17 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 321 Improper Check for Dropped Privileges <br/>SNYK-UBUNTU2004-BASH-581100 Mature
medium severity 371 Use of a Broken or Risky Cryptographic Algorithm <br/>SNYK-UBUNTU2004-NETTLE-1090728 No Known Exploit
medium severity 371 Use of a Broken or Risky Cryptographic Algorithm <br/>SNYK-UBUNTU2004-NETTLE-1090728 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit
medium severity 300 Information Exposure <br/>SNYK-UBUNTU2004-SYSTEMD-582552 No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJlMDFiOTU0Mi05MzYyLTQ1ZDMtYTIyOS0wM2I4MWE4ZGY2YzMiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImUwMWI5NTQyLTkzNjItNDVkMy1hMjI5LTAzYjgxYThkZjZjMyJ9fQ==" width="0" height="0"/> 🧐 View latest project report

🛠 Adjust project settings

+1 -1

0 comment

1 changed file

snyk-bot

pr closed time in a month

more