Closed tallclair closed 2 years ago
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: tallclair
The full list of commands accepted by this bot can be found here.
The pull request process is described here
/lgtm thanks for putting it back. I think this is useful community content.
Agreed, this may not be perfect but I didn't notice anything egregiously wrong when I skimmed it; if it provides value to the community it's good to put it back.
/lgtm
It was brought to my attention that Kubernetes users were relying on our severity thresholds for interpreting severity ratings (e.g. https://cloud.google.com/kubernetes-engine/docs/resources/security-patching#how_vulnerabilities_are_classified). These aren't perfect, but I didn't see anything too misleading. I recast these as heuristics for interpreting severity ratings, and clarified that we generally use CVSS.
I'd still prefer to switch to a guide oriented around CVSS (https://github.com/kubernetes/committee-security-response/issues/147), but I think this is acceptable until we get that written.