<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>k8s &#8211; moneyslow.com</title>
	<atom:link href="https://moneyslow.com/tag/k8s/feed" rel="self" type="application/rss+xml" />
	<link>https://moneyslow.com</link>
	<description>making money with technology</description>
	<lastBuildDate>Wed, 12 Jun 2024 00:29:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.4</generator>
	<item>
		<title>一图看懂git、k8s、微服务、docker、https工作原理</title>
		<link>https://moneyslow.com/%e4%b8%80%e5%9b%be%e7%9c%8b%e6%87%82git%e3%80%81k8s%e3%80%81%e5%be%ae%e6%9c%8d%e5%8a%a1%e3%80%81docker%e3%80%81https%e5%b7%a5%e4%bd%9c%e5%8e%9f%e7%90%86.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Fri, 31 May 2024 01:51:46 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[docker]]></category>
		<category><![CDATA[git]]></category>
		<category><![CDATA[https]]></category>
		<category><![CDATA[k8s]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=18663</guid>

					<description><![CDATA[工作原理]]></description>
		
		
		
			</item>
		<item>
		<title>kubectl cp命令潜在目录穿越漏洞(CVE-2019-11246)修复</title>
		<link>https://moneyslow.com/kubectl-cp%e5%91%bd%e4%bb%a4%e6%bd%9c%e5%9c%a8%e7%9b%ae%e5%bd%95%e7%a9%bf%e8%b6%8a%e6%bc%8f%e6%b4%9ecve-2019-11246%e4%bf%ae%e5%a4%8d.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Fri, 05 Jul 2019 21:41:48 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[k8s]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=8860</guid>

					<description><![CDATA[kubectl cp命令潜在目录穿越漏洞(CVE-2019-11246)。 漏洞描述 kubectl cp命令允许复制容器和用户计算机之间的文件，在通过tar解压时存在缺陷，当用户主动运行kubectl cp命令从container上复制tar文件并解压时可能导致用户计算机上的文件或数据被覆盖或创建。 影响组件 kubectl 影响版本 Kubernetes v1.0.x-1.10.x Kubernetes v1.11.0-1.11.x Kubernetes v1.12.0-1.12.9 Kubernetes v1.13.0-1.13.6 Kubernetes v1.14.0-1.14.2 安全版本 Kubernetes v1.12.9 Kubernetes v1.13.6 Kubernetes v1.14.2 Kubernetes v1.15.x 风险评级 CVE-2019-11246 高危 安全建议 升级Kubernetes至安全版本。 原文： https://groups.google.com/forum/m/?spm=a2c4g.11174386.n2.3.26e01051oa7CmN#!topic/kubernetes-security-announce/NLs2TGbfPdo 标题： Incomplete fixes for CVE-2019-1002101, kubectl cp potential directory traversal - CVE-2019-11246 Hello Kubernetes Community, Another security issue was discovered [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
