Commit released Helm Chart and docs for TrueCharts
Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
parent
097783bc24
commit
e7b471b060
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="code-server-2.1.0"></a>
|
||||
### [code-server-2.1.0](https://github.com/truecharts/apps/compare/code-server-2.0.20...code-server-2.1.0) (2021-12-07)
|
||||
|
||||
#### Feat
|
||||
|
||||
* enable persistence and disable password ([#1483](https://github.com/truecharts/apps/issues/1483))
|
||||
|
||||
|
||||
|
||||
<a name="code-server-2.0.20"></a>
|
||||
### [code-server-2.0.20](https://github.com/truecharts/apps/compare/code-server-2.0.19...code-server-2.0.20) (2021-12-06)
|
||||
|
||||
|
|
|
@ -11,18 +11,18 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| env.DOCKER_USER | string | `"$USER"` | |
|
||||
| env.PUID | int | `568` | |
|
||||
| args[0] | string | `"--user-data-dir"` | |
|
||||
| args[1] | string | `"/config/.vscode"` | |
|
||||
| args[2] | string | `"--auth"` | |
|
||||
| args[3] | string | `"none"` | |
|
||||
| env | object | `{}` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/code-server"` | |
|
||||
| image.tag | string | `"v3.12.0@sha256:2853a8bdd8eed9c09bcd4b100b9d4be20c42a307b9d1cbae1a204276e948f9ce"` | |
|
||||
| persistence.data.enabled | bool | `true` | |
|
||||
| persistence.data.mountPath | string | `"/home/coder"` | |
|
||||
| persistence.varrun.enabled | bool | `true` | |
|
||||
| podSecurityContext.runAsGroup | int | `0` | |
|
||||
| podSecurityContext.runAsUser | int | `0` | |
|
||||
| persistence.config.enabled | bool | `true` | |
|
||||
| persistence.config.mountPath | string | `"/config"` | |
|
||||
| securityContext.allowPrivilegeEscalation | bool | `true` | |
|
||||
| securityContext.readOnlyRootFilesystem | bool | `false` | |
|
||||
| securityContext.runAsNonRoot | bool | `false` | |
|
||||
| service.main.ports.main.port | int | `10063` | |
|
||||
| service.main.ports.main.targetPort | int | `8080` | |
|
||||
|
||||
|
|
|
@ -17,8 +17,8 @@ hide:
|
|||
|
||||
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|
||||
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
|
||||
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.allowPrivilegeEscalation' to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
|
||||
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should add 'ALL' to 'securityContext.capabilities.drop' </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
|
||||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
|
||||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
|
||||
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | <details><summary>Expand...</summary> It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should specify an image tag </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/configuration/overview/#container-images">https://kubernetes.io/docs/concepts/configuration/overview/#container-images</a><br><a href="https://avd.aquasec.com/appshield/ksv013">https://avd.aquasec.com/appshield/ksv013</a><br></details> |
|
||||
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | <details><summary>Expand...</summary> It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should specify an image tag </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/configuration/overview/#container-images">https://kubernetes.io/docs/concepts/configuration/overview/#container-images</a><br><a href="https://avd.aquasec.com/appshield/ksv013">https://avd.aquasec.com/appshield/ksv013</a><br></details> |
|
||||
|
@ -30,7 +30,6 @@ hide:
|
|||
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsUser' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
|
||||
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
|
||||
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
|
||||
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root primary or supplementary GID. <br> <hr> <br> Deployment 'RELEASE-NAME-code-server' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv029">https://avd.aquasec.com/appshield/ksv029</a><br></details> |
|
||||
|
||||
## Containers
|
||||
|
||||
|
@ -253,6 +252,7 @@ hide:
|
|||
| vim-common | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4">https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br></details> |
|
||||
| vim-common | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href="https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a">https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br></details> |
|
||||
| vim-common | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href="https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92">https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br></details> |
|
||||
| vim-common | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9">https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href="https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74">https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br></details> |
|
||||
| vim-common | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6">http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html</a><br><a href="http://secunia.com/advisories/31464">http://secunia.com/advisories/31464</a><br><a href="http://secunia.com/advisories/34418">http://secunia.com/advisories/34418</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2008:236">http://www.mandriva.com/security/advisories?name=MDVSA-2008:236</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/06/4">http://www.openwall.com/lists/oss-security/2008/10/06/4</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/16/2">http://www.openwall.com/lists/oss-security/2008/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/20/2">http://www.openwall.com/lists/oss-security/2008/10/20/2</a><br><a href="http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html">http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html</a><br><a href="http://www.securityfocus.com/archive/1/495432">http://www.securityfocus.com/archive/1/495432</a><br><a href="http://www.securityfocus.com/archive/1/495436">http://www.securityfocus.com/archive/1/495436</a><br><a href="http://www.securityfocus.com/bid/30670">http://www.securityfocus.com/bid/30670</a><br><a href="http://www.vupen.com/english/advisories/2008/2379">http://www.vupen.com/english/advisories/2008/2379</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=461750">https://bugzilla.redhat.com/show_bug.cgi?id=461750</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/44419">https://exchange.xforce.ibmcloud.com/vulnerabilities/44419</a><br></details> |
|
||||
| vim-common | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://security.cucumberlinux.com/security/details.php?id=120">http://security.cucumberlinux.com/security/details.php?id=120</a><br><a href="http://www.openwall.com/lists/oss-security/2017/10/31/1">http://www.openwall.com/lists/oss-security/2017/10/31/1</a><br></details> |
|
||||
| vim-tiny | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/01/1">http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href="https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e">https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href="https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9">https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href="https://ubuntu.com/security/notices/USN-5093-1">https://ubuntu.com/security/notices/USN-5093-1</a><br></details> |
|
||||
|
@ -267,6 +267,7 @@ hide:
|
|||
| vim-tiny | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4">https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br></details> |
|
||||
| vim-tiny | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href="https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a">https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br></details> |
|
||||
| vim-tiny | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href="https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92">https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br></details> |
|
||||
| vim-tiny | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9">https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href="https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74">https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br></details> |
|
||||
| vim-tiny | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6">http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html</a><br><a href="http://secunia.com/advisories/31464">http://secunia.com/advisories/31464</a><br><a href="http://secunia.com/advisories/34418">http://secunia.com/advisories/34418</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2008:236">http://www.mandriva.com/security/advisories?name=MDVSA-2008:236</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/06/4">http://www.openwall.com/lists/oss-security/2008/10/06/4</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/16/2">http://www.openwall.com/lists/oss-security/2008/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/20/2">http://www.openwall.com/lists/oss-security/2008/10/20/2</a><br><a href="http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html">http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html</a><br><a href="http://www.securityfocus.com/archive/1/495432">http://www.securityfocus.com/archive/1/495432</a><br><a href="http://www.securityfocus.com/archive/1/495436">http://www.securityfocus.com/archive/1/495436</a><br><a href="http://www.securityfocus.com/bid/30670">http://www.securityfocus.com/bid/30670</a><br><a href="http://www.vupen.com/english/advisories/2008/2379">http://www.vupen.com/english/advisories/2008/2379</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=461750">https://bugzilla.redhat.com/show_bug.cgi?id=461750</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/44419">https://exchange.xforce.ibmcloud.com/vulnerabilities/44419</a><br></details> |
|
||||
| vim-tiny | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://security.cucumberlinux.com/security/details.php?id=120">http://security.cucumberlinux.com/security/details.php?id=120</a><br><a href="http://www.openwall.com/lists/oss-security/2017/10/31/1">http://www.openwall.com/lists/oss-security/2017/10/31/1</a><br></details> |
|
||||
| xxd | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/01/1">http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href="https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e">https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href="https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9">https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href="https://ubuntu.com/security/notices/USN-5093-1">https://ubuntu.com/security/notices/USN-5093-1</a><br></details> |
|
||||
|
@ -281,6 +282,7 @@ hide:
|
|||
| xxd | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4">https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br></details> |
|
||||
| xxd | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href="https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a">https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br></details> |
|
||||
| xxd | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href="https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92">https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br></details> |
|
||||
| xxd | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9">https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href="https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74">https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br></details> |
|
||||
| xxd | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6">http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html</a><br><a href="http://secunia.com/advisories/31464">http://secunia.com/advisories/31464</a><br><a href="http://secunia.com/advisories/34418">http://secunia.com/advisories/34418</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2008:236">http://www.mandriva.com/security/advisories?name=MDVSA-2008:236</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/06/4">http://www.openwall.com/lists/oss-security/2008/10/06/4</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/16/2">http://www.openwall.com/lists/oss-security/2008/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/20/2">http://www.openwall.com/lists/oss-security/2008/10/20/2</a><br><a href="http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html">http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html</a><br><a href="http://www.securityfocus.com/archive/1/495432">http://www.securityfocus.com/archive/1/495432</a><br><a href="http://www.securityfocus.com/archive/1/495436">http://www.securityfocus.com/archive/1/495436</a><br><a href="http://www.securityfocus.com/bid/30670">http://www.securityfocus.com/bid/30670</a><br><a href="http://www.vupen.com/english/advisories/2008/2379">http://www.vupen.com/english/advisories/2008/2379</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=461750">https://bugzilla.redhat.com/show_bug.cgi?id=461750</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/44419">https://exchange.xforce.ibmcloud.com/vulnerabilities/44419</a><br></details> |
|
||||
| xxd | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://security.cucumberlinux.com/security/details.php?id=120">http://security.cucumberlinux.com/security/details.php?id=120</a><br><a href="http://www.openwall.com/lists/oss-security/2017/10/31/1">http://www.openwall.com/lists/oss-security/2017/10/31/1</a><br></details> |
|
||||
|
||||
|
|
|
@ -1,6 +1,15 @@
|
|||
# Changelog<br>
|
||||
|
||||
|
||||
<a name="code-server-2.1.0"></a>
|
||||
### [code-server-2.1.0](https://github.com/truecharts/apps/compare/code-server-2.0.20...code-server-2.1.0) (2021-12-07)
|
||||
|
||||
#### Feat
|
||||
|
||||
* enable persistence and disable password ([#1483](https://github.com/truecharts/apps/issues/1483))
|
||||
|
||||
|
||||
|
||||
<a name="code-server-2.0.20"></a>
|
||||
### [code-server-2.0.20](https://github.com/truecharts/apps/compare/code-server-2.0.19...code-server-2.0.20) (2021-12-06)
|
||||
|
||||
|
|
|
@ -11,18 +11,18 @@ You will, however, be able to use all values referenced in the common chart here
|
|||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| env.DOCKER_USER | string | `"$USER"` | |
|
||||
| env.PUID | int | `568` | |
|
||||
| args[0] | string | `"--user-data-dir"` | |
|
||||
| args[1] | string | `"/config/.vscode"` | |
|
||||
| args[2] | string | `"--auth"` | |
|
||||
| args[3] | string | `"none"` | |
|
||||
| env | object | `{}` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.repository | string | `"tccr.io/truecharts/code-server"` | |
|
||||
| image.tag | string | `"v3.12.0@sha256:2853a8bdd8eed9c09bcd4b100b9d4be20c42a307b9d1cbae1a204276e948f9ce"` | |
|
||||
| persistence.data.enabled | bool | `true` | |
|
||||
| persistence.data.mountPath | string | `"/home/coder"` | |
|
||||
| persistence.varrun.enabled | bool | `true` | |
|
||||
| podSecurityContext.runAsGroup | int | `0` | |
|
||||
| podSecurityContext.runAsUser | int | `0` | |
|
||||
| persistence.config.enabled | bool | `true` | |
|
||||
| persistence.config.mountPath | string | `"/config"` | |
|
||||
| securityContext.allowPrivilegeEscalation | bool | `true` | |
|
||||
| securityContext.readOnlyRootFilesystem | bool | `false` | |
|
||||
| securityContext.runAsNonRoot | bool | `false` | |
|
||||
| service.main.ports.main.port | int | `10063` | |
|
||||
| service.main.ports.main.targetPort | int | `8080` | |
|
||||
|
||||
|
|
|
@ -17,8 +17,8 @@ hide:
|
|||
|
||||
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|
||||
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
|
||||
| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | <details><summary>Expand...</summary> A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.allowPrivilegeEscalation' to false </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv001">https://avd.aquasec.com/appshield/ksv001</a><br></details> |
|
||||
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | <details><summary>Expand...</summary> The container should drop all default capabilities and add only those that are needed for its execution. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should add 'ALL' to 'securityContext.capabilities.drop' </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/">https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/</a><br><a href="https://avd.aquasec.com/appshield/ksv003">https://avd.aquasec.com/appshield/ksv003</a><br></details> |
|
||||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
|
||||
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | <details><summary>Expand...</summary> 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv012">https://avd.aquasec.com/appshield/ksv012</a><br></details> |
|
||||
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | <details><summary>Expand...</summary> It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should specify an image tag </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/configuration/overview/#container-images">https://kubernetes.io/docs/concepts/configuration/overview/#container-images</a><br><a href="https://avd.aquasec.com/appshield/ksv013">https://avd.aquasec.com/appshield/ksv013</a><br></details> |
|
||||
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | <details><summary>Expand...</summary> It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should specify an image tag </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/configuration/overview/#container-images">https://kubernetes.io/docs/concepts/configuration/overview/#container-images</a><br><a href="https://avd.aquasec.com/appshield/ksv013">https://avd.aquasec.com/appshield/ksv013</a><br></details> |
|
||||
|
@ -30,7 +30,6 @@ hide:
|
|||
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsUser' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv020">https://avd.aquasec.com/appshield/ksv020</a><br></details> |
|
||||
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
|
||||
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | <details><summary>Expand...</summary> Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table. <br> <hr> <br> Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000 </details>| <details><summary>Expand...</summary><a href="https://kubesec.io/basics/containers-securitycontext-runasuser/">https://kubesec.io/basics/containers-securitycontext-runasuser/</a><br><a href="https://avd.aquasec.com/appshield/ksv021">https://avd.aquasec.com/appshield/ksv021</a><br></details> |
|
||||
| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | <details><summary>Expand...</summary> Containers should be forbidden from running with a root primary or supplementary GID. <br> <hr> <br> Deployment 'RELEASE-NAME-code-server' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0 </details>| <details><summary>Expand...</summary><a href="https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted">https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted</a><br><a href="https://avd.aquasec.com/appshield/ksv029">https://avd.aquasec.com/appshield/ksv029</a><br></details> |
|
||||
|
||||
## Containers
|
||||
|
||||
|
@ -253,6 +252,7 @@ hide:
|
|||
| vim-common | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4">https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br></details> |
|
||||
| vim-common | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href="https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a">https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br></details> |
|
||||
| vim-common | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href="https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92">https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br></details> |
|
||||
| vim-common | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9">https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href="https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74">https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br></details> |
|
||||
| vim-common | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6">http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html</a><br><a href="http://secunia.com/advisories/31464">http://secunia.com/advisories/31464</a><br><a href="http://secunia.com/advisories/34418">http://secunia.com/advisories/34418</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2008:236">http://www.mandriva.com/security/advisories?name=MDVSA-2008:236</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/06/4">http://www.openwall.com/lists/oss-security/2008/10/06/4</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/16/2">http://www.openwall.com/lists/oss-security/2008/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/20/2">http://www.openwall.com/lists/oss-security/2008/10/20/2</a><br><a href="http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html">http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html</a><br><a href="http://www.securityfocus.com/archive/1/495432">http://www.securityfocus.com/archive/1/495432</a><br><a href="http://www.securityfocus.com/archive/1/495436">http://www.securityfocus.com/archive/1/495436</a><br><a href="http://www.securityfocus.com/bid/30670">http://www.securityfocus.com/bid/30670</a><br><a href="http://www.vupen.com/english/advisories/2008/2379">http://www.vupen.com/english/advisories/2008/2379</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=461750">https://bugzilla.redhat.com/show_bug.cgi?id=461750</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/44419">https://exchange.xforce.ibmcloud.com/vulnerabilities/44419</a><br></details> |
|
||||
| vim-common | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://security.cucumberlinux.com/security/details.php?id=120">http://security.cucumberlinux.com/security/details.php?id=120</a><br><a href="http://www.openwall.com/lists/oss-security/2017/10/31/1">http://www.openwall.com/lists/oss-security/2017/10/31/1</a><br></details> |
|
||||
| vim-tiny | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/01/1">http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href="https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e">https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href="https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9">https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href="https://ubuntu.com/security/notices/USN-5093-1">https://ubuntu.com/security/notices/USN-5093-1</a><br></details> |
|
||||
|
@ -267,6 +267,7 @@ hide:
|
|||
| vim-tiny | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4">https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br></details> |
|
||||
| vim-tiny | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href="https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a">https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br></details> |
|
||||
| vim-tiny | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href="https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92">https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br></details> |
|
||||
| vim-tiny | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9">https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href="https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74">https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br></details> |
|
||||
| vim-tiny | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6">http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html</a><br><a href="http://secunia.com/advisories/31464">http://secunia.com/advisories/31464</a><br><a href="http://secunia.com/advisories/34418">http://secunia.com/advisories/34418</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2008:236">http://www.mandriva.com/security/advisories?name=MDVSA-2008:236</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/06/4">http://www.openwall.com/lists/oss-security/2008/10/06/4</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/16/2">http://www.openwall.com/lists/oss-security/2008/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/20/2">http://www.openwall.com/lists/oss-security/2008/10/20/2</a><br><a href="http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html">http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html</a><br><a href="http://www.securityfocus.com/archive/1/495432">http://www.securityfocus.com/archive/1/495432</a><br><a href="http://www.securityfocus.com/archive/1/495436">http://www.securityfocus.com/archive/1/495436</a><br><a href="http://www.securityfocus.com/bid/30670">http://www.securityfocus.com/bid/30670</a><br><a href="http://www.vupen.com/english/advisories/2008/2379">http://www.vupen.com/english/advisories/2008/2379</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=461750">https://bugzilla.redhat.com/show_bug.cgi?id=461750</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/44419">https://exchange.xforce.ibmcloud.com/vulnerabilities/44419</a><br></details> |
|
||||
| vim-tiny | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://security.cucumberlinux.com/security/details.php?id=120">http://security.cucumberlinux.com/security/details.php?id=120</a><br><a href="http://www.openwall.com/lists/oss-security/2017/10/31/1">http://www.openwall.com/lists/oss-security/2017/10/31/1</a><br></details> |
|
||||
| xxd | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://www.openwall.com/lists/oss-security/2021/10/01/1">http://www.openwall.com/lists/oss-security/2021/10/01/1</a><br><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770</a><br><a href="https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e">https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e</a><br><a href="https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9">https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365</a><br><a href="https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/">https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/</a><br><a href="https://ubuntu.com/security/notices/USN-5093-1">https://ubuntu.com/security/notices/USN-5093-1</a><br></details> |
|
||||
|
@ -281,6 +282,7 @@ hide:
|
|||
| xxd | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6">https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6</a><br><a href="https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4">https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/</a><br></details> |
|
||||
| xxd | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655</a><br><a href="https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)">https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)</a><br><a href="https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a">https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a</a><br></details> |
|
||||
| xxd | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142</a><br><a href="https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)">https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)</a><br><a href="https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92">https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92</a><br><a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/</a><br></details> |
|
||||
| xxd | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9">https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9</a><br><a href="https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74">https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74</a><br></details> |
|
||||
| xxd | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6">http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6</a><br><a href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html</a><br><a href="http://secunia.com/advisories/31464">http://secunia.com/advisories/31464</a><br><a href="http://secunia.com/advisories/34418">http://secunia.com/advisories/34418</a><br><a href="http://www.mandriva.com/security/advisories?name=MDVSA-2008:236">http://www.mandriva.com/security/advisories?name=MDVSA-2008:236</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/06/4">http://www.openwall.com/lists/oss-security/2008/10/06/4</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/16/2">http://www.openwall.com/lists/oss-security/2008/10/16/2</a><br><a href="http://www.openwall.com/lists/oss-security/2008/10/20/2">http://www.openwall.com/lists/oss-security/2008/10/20/2</a><br><a href="http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html">http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html</a><br><a href="http://www.securityfocus.com/archive/1/495432">http://www.securityfocus.com/archive/1/495432</a><br><a href="http://www.securityfocus.com/archive/1/495436">http://www.securityfocus.com/archive/1/495436</a><br><a href="http://www.securityfocus.com/bid/30670">http://www.securityfocus.com/bid/30670</a><br><a href="http://www.vupen.com/english/advisories/2008/2379">http://www.vupen.com/english/advisories/2008/2379</a><br><a href="https://bugzilla.redhat.com/show_bug.cgi?id=461750">https://bugzilla.redhat.com/show_bug.cgi?id=461750</a><br><a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/44419">https://exchange.xforce.ibmcloud.com/vulnerabilities/44419</a><br></details> |
|
||||
| xxd | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | <details><summary>Expand...</summary><a href="http://security.cucumberlinux.com/security/details.php?id=120">http://security.cucumberlinux.com/security/details.php?id=120</a><br><a href="http://www.openwall.com/lists/oss-security/2017/10/31/1">http://www.openwall.com/lists/oss-security/2017/10/31/1</a><br></details> |
|
||||
|
||||
|
|
|
@ -122,6 +122,39 @@ entries:
|
|||
- https://github.com/truecharts/apps/releases/download/booksonic-air-4.0.20/booksonic-air-4.0.20.tgz
|
||||
version: 4.0.20
|
||||
code-server:
|
||||
- annotations:
|
||||
truecharts.org/SCALE-support: "true"
|
||||
truecharts.org/catagories: |
|
||||
- media
|
||||
truecharts.org/grade: U
|
||||
apiVersion: v2
|
||||
appVersion: 3.12.0
|
||||
created: "2021-12-07T13:02:26.749061252Z"
|
||||
dependencies:
|
||||
- name: common
|
||||
repository: https://truecharts.org
|
||||
version: 8.9.13
|
||||
description: Run VS Code on any machine anywhere and access it in the browser.
|
||||
digest: 8353baccf5417676234d09530301f8103b29ad2151804e68da69f99a16001cdb
|
||||
home: https://github.com/truecharts/apps/tree/master/charts/stable/code-server
|
||||
icon: https://github.com/truecharts/apps/raw/main/images/code-server.jpg
|
||||
keywords:
|
||||
- code
|
||||
- vs
|
||||
- visual studio
|
||||
- vscode
|
||||
kubeVersion: '>=1.16.0-0'
|
||||
maintainers:
|
||||
- email: info@truecharts.org
|
||||
name: TrueCharts
|
||||
url: https://truecharts.org
|
||||
name: code-server
|
||||
sources:
|
||||
- https://github.com/cdr/code-server
|
||||
type: application
|
||||
urls:
|
||||
- https://github.com/truecharts/apps/releases/download/code-server-2.1.0/code-server-2.1.0.tgz
|
||||
version: 2.1.0
|
||||
- annotations:
|
||||
truecharts.org/SCALE-support: "true"
|
||||
truecharts.org/catagories: |
|
||||
|
@ -1195,4 +1228,4 @@ entries:
|
|||
urls:
|
||||
- https://github.com/truecharts/apps/releases/download/tt-rss-4.0.15/tt-rss-4.0.15.tgz
|
||||
version: 4.0.15
|
||||
generated: "2021-12-07T12:27:50.993375451Z"
|
||||
generated: "2021-12-07T13:02:26.749099652Z"
|
||||
|
|
Loading…
Reference in New Issue