[zh-cn] Localize blog 2022-09-12-Announcing-the-Auto-Refreshing-Official-CVE-Feed

pull/36757/head
jzhupup 2022-09-12 22:39:53 +08:00
parent eb82e6e2d8
commit 5a87aaacdb
1 changed files with 144 additions and 0 deletions

View File

@ -0,0 +1,144 @@
---
layout: blog
title: 宣布自动刷新官方 Kubernetes CVE 订阅源
date: 2022-09-12
slug: k8s-cve-feed-alpha
---
<!--
layout: blog
title: Announcing the Auto-refreshing Official Kubernetes CVE Feed
date: 2022-09-12
slug: k8s-cve-feed-alpha
-->
<!--
**Author**: Pushkar Joglekar (VMware)
A long-standing request from the Kubernetes community has been to have a
programmatic way for end users to keep track of Kubernetes security issues
(also called "CVEs", after the database that tracks public security issues across
different products and vendors). Accompanying the release of Kubernetes v1.25,
we are excited to announce availability of such
a [feed](/docs/reference/issues-security/official-cve-feed/) as an `alpha`
feature. This blog will cover the background and scope of this new service.
-->
**作者**Pushkar Joglekar (VMware)
Kubernetes 社区有一个长时间未解决的需求,即为最终用户提供一种编程方式来跟踪
Kubernetes 安全问题(也称为 “CVE”这来自于跟踪不同产品和供应商的公共安全问题的数据库
随着 Kubernetes v1.25 的发布,我们很高兴地宣布以 `alpha`
特性的形式推出这样的[订阅源](/zh-cn/docs/reference/issues-security/official-cve-feed/)。
在这篇博客中将介绍这项新服务的背景和范围。
<!--
## Motivation
With the growing number of eyes on Kubernetes, the number of CVEs related to
Kubernetes have increased. Although most CVEs that directly, indirectly, or
transitively impact Kubernetes are regularly fixed, there is no single place for
the end users of Kubernetes to programmatically subscribe or pull the data of
fixed CVEs. Current options are either broken or incomplete.
-->
## 动机
随着关注 Kubernetes 的人越来越多,与 Kubernetes 相关的 CVE 数量也在增加。
尽管大多数直接地、间接地或传递性地影响 Kubernetes 的 CVE 都被定期修复,
但 Kubernetes 的最终用户没有一个地方能够以编程方式来订阅或拉取固定的 CVE 数据。
目前的一些数据源要么已损坏,要么不完整。
<!--
## Scope
### What This Does
Create a periodically auto-refreshing, human and machine-readable list of
official Kubernetes CVEs
-->
## 范围
### 能做什么
创建一个定期自动刷新的、人和机器可读的官方 Kubernetes CVE 列表。
<!--
### What This Doesn't Do
* Triage and vulnerability disclosure will continue to be done by SRC (Security
Response Committee).
* Listing CVEs that are identified in build time dependencies and container
images are out of scope.
* Only official CVEs announced by the Kubernetes SRC will be published in the
feed.
-->
### 不能做什么
* 漏洞的分类和披露将继续由 SRCSecurity Response Committee安全响应委员会完成。
* 不会列出在构建时依赖项和容器镜像中发现的 CVE。
* 只有 Kubernetes SRC 公布的官方 CVE 才会在订阅源中发布。
<!--
### Who It's For
* **End Users**: Persons or teams who _use_ Kubernetes to deploy applications
they own
* **Platform Providers**: Persons or teams who _manage_ Kubernetes clusters
* **Maintainers**: Persons or teams who _create_ and _support_ Kubernetes
releases through their work in Kubernetes Community - via various Special
Interest Groups and Committees.
-->
### 针对的受众
* **最终用户****使用** Kubernetes 部署他们的应用程序的个人或团队。
* **平台提供商****管理** Kubernetes 集群的个人或团队。
* **维护人员**:通过各种特别兴趣小组和委员会在 Kubernetes 社区中**创建**和**支持** Kubernetes
发布版本的个人或团队。
<!--
## Implementation Details
A supporting
[contributor blog](https://kubernetes.dev/blog/2022/09/12/k8s-cve-feed-alpha/)
was published that describes in depth on how this CVE feed was implemented to
ensure the feed was reasonably protected against tampering and was automatically
updated after a new CVE was announced.
-->
## 实现细节
发布了一个支持性的[贡献者博客](https://kubernetes.dev/blog/2022/09/12/k8s-cve-feed-alpha/),
深入讲述这个 CVE 订阅源是如何实现的,如何确保该订阅源得到合理的保护以免被篡改,
如何在一个新的 CVE 被公布后自动更新这个订阅源。
<!--
## What's Next?
In order to graduate this feature, SIG Security
is gathering feedback from end users who are using this alpha feed.
-->
## 下一步工作
为了完善此功能SIG Security 正在收集使用此 Alpha 订阅源的最终用户的反馈。
<!--
So in order to improve the feed in future Kubernetes Releases, if you have any
feedback, please let us know by adding a comment to
this [tracking issue](https://github.com/kubernetes/sig-security/issues/1) or
let us know on
[#sig-security-tooling](https://kubernetes.slack.com/archives/C01CUSVMHPY)
Kubernetes Slack channel.
(Join [Kubernetes Slack here](https://slack.k8s.io))
-->
因此,为了在未来的 Kubernetes 版本中改进订阅源,如果你有任何反馈,请通过添加评论至
[问题追踪](https://github.com/kubernetes/sig-security/issues/1)告诉我们,
或者在 [#sig-security-tooling](https://kubernetes.slack.com/archives/C01CUSVMHPY)
Kubernetes Slack 频道上告诉我们(从[这里](https://slack.k8s.io)加入 Kubernetes Slack) 。
<!--
_A special shout out and massive thanks to Neha Lohia
[(@nehalohia27)](https://github.com/nehalohia27) and Tim
Bannister [(@sftim)](https://github.com/sftim) for their stellar collaboration
for many months from "ideation to implementation" of this feature._
-->
**特别感谢 Neha Lohia
[(@nehalohia27)](https://github.com/nehalohia27)
和 Tim Bannister [(@sftim)](https://github.com/sftim)
感谢他们几个月来从“构思到实现”此特性的出色合作。**