diff --git a/stable/code-server/2.0.20/CHANGELOG.md b/stable/code-server/2.1.0/CHANGELOG.md similarity index 91% rename from stable/code-server/2.0.20/CHANGELOG.md rename to stable/code-server/2.1.0/CHANGELOG.md index 26210965e56..a51bc99ffe8 100644 --- a/stable/code-server/2.0.20/CHANGELOG.md +++ b/stable/code-server/2.1.0/CHANGELOG.md @@ -1,6 +1,15 @@ # Changelog
+ +### [code-server-2.1.0](https://github.com/truecharts/apps/compare/code-server-2.0.20...code-server-2.1.0) (2021-12-07) + +#### Feat + +* enable persistence and disable password ([#1483](https://github.com/truecharts/apps/issues/1483)) + + + ### [code-server-2.0.20](https://github.com/truecharts/apps/compare/code-server-2.0.19...code-server-2.0.20) (2021-12-06) @@ -88,12 +97,3 @@ * update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432)) #### Fix - -* move conflicting ports to 10xxx range ([#1415](https://github.com/truecharts/apps/issues/1415)) - - - - -### [code-server-2.0.12](https://github.com/truecharts/apps/compare/code-server-2.0.11...code-server-2.0.12) (2021-11-23) - -#### Chore diff --git a/stable/code-server/2.0.20/CONFIG.md b/stable/code-server/2.1.0/CONFIG.md similarity index 100% rename from stable/code-server/2.0.20/CONFIG.md rename to stable/code-server/2.1.0/CONFIG.md diff --git a/stable/code-server/2.0.20/Chart.lock b/stable/code-server/2.1.0/Chart.lock similarity index 78% rename from stable/code-server/2.0.20/Chart.lock rename to stable/code-server/2.1.0/Chart.lock index 7799298661a..a4055b3305f 100644 --- a/stable/code-server/2.0.20/Chart.lock +++ b/stable/code-server/2.1.0/Chart.lock @@ -3,4 +3,4 @@ dependencies: repository: https://truecharts.org version: 8.9.13 digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7 -generated: "2021-12-06T21:10:22.347984222Z" +generated: "2021-12-07T13:00:13.169036303Z" diff --git a/stable/code-server/2.0.20/Chart.yaml b/stable/code-server/2.1.0/Chart.yaml similarity index 97% rename from stable/code-server/2.0.20/Chart.yaml rename to stable/code-server/2.1.0/Chart.yaml index a5303202893..b463c88a4c7 100644 --- a/stable/code-server/2.0.20/Chart.yaml +++ b/stable/code-server/2.1.0/Chart.yaml @@ -21,7 +21,7 @@ name: code-server sources: - https://github.com/cdr/code-server type: application -version: 2.0.20 +version: 2.1.0 annotations: truecharts.org/catagories: | - media diff --git a/stable/code-server/2.0.20/README.md b/stable/code-server/2.1.0/README.md similarity index 100% rename from stable/code-server/2.0.20/README.md rename to stable/code-server/2.1.0/README.md diff --git a/stable/code-server/2.0.20/app-readme.md b/stable/code-server/2.1.0/app-readme.md similarity index 100% rename from stable/code-server/2.0.20/app-readme.md rename to stable/code-server/2.1.0/app-readme.md diff --git a/stable/code-server/2.0.20/charts/common-8.9.13.tgz b/stable/code-server/2.1.0/charts/common-8.9.13.tgz similarity index 100% rename from stable/code-server/2.0.20/charts/common-8.9.13.tgz rename to stable/code-server/2.1.0/charts/common-8.9.13.tgz diff --git a/stable/code-server/2.0.20/helm-values.md b/stable/code-server/2.1.0/helm-values.md similarity index 74% rename from stable/code-server/2.0.20/helm-values.md rename to stable/code-server/2.1.0/helm-values.md index b571ad96b98..413e6679ce5 100644 --- a/stable/code-server/2.0.20/helm-values.md +++ b/stable/code-server/2.1.0/helm-values.md @@ -11,18 +11,18 @@ You will, however, be able to use all values referenced in the common chart here | Key | Type | Default | Description | |-----|------|---------|-------------| -| env.DOCKER_USER | string | `"$USER"` | | -| env.PUID | int | `568` | | +| args[0] | string | `"--user-data-dir"` | | +| args[1] | string | `"/config/.vscode"` | | +| args[2] | string | `"--auth"` | | +| args[3] | string | `"none"` | | +| env | object | `{}` | | | image.pullPolicy | string | `"IfNotPresent"` | | | image.repository | string | `"tccr.io/truecharts/code-server"` | | | image.tag | string | `"v3.12.0@sha256:2853a8bdd8eed9c09bcd4b100b9d4be20c42a307b9d1cbae1a204276e948f9ce"` | | -| persistence.data.enabled | bool | `true` | | -| persistence.data.mountPath | string | `"/home/coder"` | | -| persistence.varrun.enabled | bool | `true` | | -| podSecurityContext.runAsGroup | int | `0` | | -| podSecurityContext.runAsUser | int | `0` | | +| persistence.config.enabled | bool | `true` | | +| persistence.config.mountPath | string | `"/config"` | | +| securityContext.allowPrivilegeEscalation | bool | `true` | | | securityContext.readOnlyRootFilesystem | bool | `false` | | -| securityContext.runAsNonRoot | bool | `false` | | | service.main.ports.main.port | int | `10063` | | | service.main.ports.main.targetPort | int | `8080` | | diff --git a/stable/code-server/2.0.20/ix_values.yaml b/stable/code-server/2.1.0/ix_values.yaml similarity index 60% rename from stable/code-server/2.0.20/ix_values.yaml rename to stable/code-server/2.1.0/ix_values.yaml index 4a0c75a0fe1..2cafd555038 100644 --- a/stable/code-server/2.0.20/ix_values.yaml +++ b/stable/code-server/2.1.0/ix_values.yaml @@ -3,22 +3,18 @@ image: pullPolicy: IfNotPresent tag: v3.12.0@sha256:2853a8bdd8eed9c09bcd4b100b9d4be20c42a307b9d1cbae1a204276e948f9ce -# PASSWORD: password -# SUDO_PASSWORD: password -# HASHED_PASSWORD +args: + - --user-data-dir + - "/config/.vscode" + - --auth + - none -env: - PUID: 568 - DOCKER_USER: "$USER" +env: {} # PROXY_DOMAIN: code-server.my.domain securityContext: readOnlyRootFilesystem: false - runAsNonRoot: false - -podSecurityContext: - runAsUser: 0 - runAsGroup: 0 + allowPrivilegeEscalation: true service: main: @@ -28,8 +24,6 @@ service: targetPort: 8080 persistence: - data: - enabled: true - mountPath: "/home/coder" - varrun: + config: enabled: true + mountPath: "/config" diff --git a/stable/code-server/2.0.20/questions.yaml b/stable/code-server/2.1.0/questions.yaml similarity index 99% rename from stable/code-server/2.0.20/questions.yaml rename to stable/code-server/2.1.0/questions.yaml index bcfc0be247f..fc8780aa2e3 100644 --- a/stable/code-server/2.0.20/questions.yaml +++ b/stable/code-server/2.1.0/questions.yaml @@ -591,9 +591,9 @@ questions: schema: type: dict attrs: - - variable: data - label: "App Data Storage" - description: "Stores the Application Data." + - variable: config + label: "App Config Storage" + description: "Stores the Application Config." schema: type: dict attrs: @@ -656,7 +656,7 @@ questions: description: "Path inside the container the storage is mounted" schema: type: string - default: "/home/coder" + default: "/config" hidden: true valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$' - variable: medium diff --git a/stable/code-server/2.0.20/security.md b/stable/code-server/2.1.0/security.md similarity index 99% rename from stable/code-server/2.0.20/security.md rename to stable/code-server/2.1.0/security.md index 2681e9e1d9b..7270255fcc7 100644 --- a/stable/code-server/2.0.20/security.md +++ b/stable/code-server/2.1.0/security.md @@ -17,8 +17,8 @@ hide: | Type | Misconfiguration ID | Check | Severity | Explaination | Links | |:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------| +| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM |
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.allowPrivilegeEscalation' to false
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
| | Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW |
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should add 'ALL' to 'securityContext.capabilities.drop'
|
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
| -| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| | Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM |
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
| | Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| | Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW |
Expand... It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.


Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should specify an image tag
|
Expand...https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
| @@ -30,7 +30,6 @@ hide: | Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM |
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsUser' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
| | Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| | Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM |
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000
|
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
| -| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW |
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-code-server' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
|
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
| ## Containers @@ -253,6 +252,7 @@ hide: | vim-common | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | |
Expand...https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
| | vim-common | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
| | vim-common | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
| +| vim-common | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | |
Expand...https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
| | vim-common | CVE-2008-4677 | LOW | 2:8.2.2434-3 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| | vim-common | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| | vim-tiny | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| @@ -267,6 +267,7 @@ hide: | vim-tiny | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | |
Expand...https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
| | vim-tiny | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
| | vim-tiny | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
| +| vim-tiny | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | |
Expand...https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
| | vim-tiny | CVE-2008-4677 | LOW | 2:8.2.2434-3 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| | vim-tiny | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| | xxd | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | |
Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
| @@ -281,6 +282,7 @@ hide: | xxd | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | |
Expand...https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
| | xxd | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
| | xxd | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | |
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
| +| xxd | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | |
Expand...https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
| | xxd | CVE-2008-4677 | LOW | 2:8.2.2434-3 | |
Expand...http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
| | xxd | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | |
Expand...http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
| diff --git a/stable/code-server/2.0.20/templates/common.yaml b/stable/code-server/2.1.0/templates/common.yaml similarity index 100% rename from stable/code-server/2.0.20/templates/common.yaml rename to stable/code-server/2.1.0/templates/common.yaml diff --git a/stable/code-server/2.0.20/values.yaml b/stable/code-server/2.1.0/values.yaml similarity index 100% rename from stable/code-server/2.0.20/values.yaml rename to stable/code-server/2.1.0/values.yaml