KubeCon 2018 NA Subpath
2020-02-27 58浏览
- 1.How Symlinks Pwned K8s Michelle Au, Software Engineer, Google Jan Šafránek, Software Engineer, Red Hat
- 2.Agenda Discovery Development Disclosure Secure Practices Future
- 3.Vulnerability Reporting
- 4.Reporting Github issue created 2017-11-30 PodSecurityPolicy can be sidestepped with innocent emptyDir and subpath Here is a pod which would be allowed by fairly strict security policies, yet gives full control over node host by gaining access to dockersocket:…
- 5.Reporting Github issue created 2017-11-30 PodSecurityPolicy can be sidestepped with innocent emptyDir and subpath Here is a pod which would be allowed by fairly strict security policies, yet gives full control over node host by gaining access to dockersocket:…
- 6.Reporting That’s not how it’s done! Followhttps://kubernetes.io/docs/reference/issues-security/security/● Responsibly disclose to allow time to fix before public disclosure ● security@kubernetes.io (optionally GPG encrypted) ● Product Security Team handles the rest ○ Evaluate impact ○ Request CVE ○ Coordinate development of fix, release, disclosure
- 7.Vulnerability Details
- 8.Volumes Background Nodekind:Podspec:containers:-name:'>name: