Update Changelog for 1.5.5

pull/6/head
Saad Ali 2017-03-21 18:59:30 -07:00 committed by GitHub
parent 321acf00e5
commit b3be5774c9
1 changed files with 27 additions and 1 deletions

View File

@ -388,7 +388,33 @@
# v1.5.5
[Documentation](https://docs.k8s.io) & [Examples](https://releases.k8s.io/release-1.5.4/examples)
This release contains a fix for a PodSecurityPolicy vulnerability which allows users to make use of any existing PodSecurityPolicy object, even ones they are not authorized to use.
Other then that, this release contains no other changes from 1.5.4.
The vulnerability is tracked in http://issue.k8s.io/43459.
**Who is affected?**
Only Kubernetes 1.5.0-1.5.4 installations that do all of the following:
* Enable the PodSecurityPolicy API (which is not enabled by default):
* `--runtime-config=extensions/v1beta1/podsecuritypolicy=true`
* Enable the PodSecurityPolicy admission plugin (which is not enabled by default):
* `--admission-control=...,PodSecurityPolicy,...`
* Use authorization to limit users' ability to use specific PodSecurityPolicy objects
**What is the impact?**
A user that is authorized to create pods can make use of any existing PodSecurityPolicy, even ones they are not authorized to use.
**How can I mitigate this prior to installing 1.5.5?**
1. Export existing PodSecurityPolicy objects:
* `kubectl get podsecuritypolicies -o yaml > psp.yaml`
2. Review and delete any PodSecurityPolicy objects you do not want all pod-creating users to be able to use (NOTE: Privileged users that were making use of those policies will also lose access to those policies). For example:
* `kubectl delete podsecuritypolicies/my-privileged-policy`
3. After upgrading to 1.5.5, re-create the exported PodSecurityPolicy objects:
* `kubectl create -f psp.yaml`
## Downloads for v1.5.5