Handling the Kubernetes symbolic link vulnerability
Handling the Kubernetes symbolic link vulnerability
Posted Jan 7, 2019 21:13 UTC (Mon) by zoobab (guest, #9945)Parent article: Handling the Kubernetes symbolic link vulnerability
"The Kubernetes project first became aware of the problem from a GitHub issue that was created on November 30, 2017. It gave full detail of the bug and was posted publicly. That is not the proper channel for reporting Kubernetes security bugs, Au stressed. Luckily, a security team member saw the bug report and cleared out all of the details, moving it to a private issue tracker. There is a documented disclosure process for the project that anyone finding a security problem should follow, she said."
At least next time, post it publicly on a server where anybody else cannot intervene to censor it.