Merge pull request #43492 from kubernetes/ChangeLog155
Automatic merge from submit-queue Update Changelog for 1.5.5 Update changelog for 1.5.5 to capture change details now that [vulnerability has been disclosed](https://groups.google.com/forum/?utm_medium=email&utm_source=footer#!msg/kubernetes-announce/7tvmimkHj0k/RLlImP_kBwAJ).
This commit is contained in:
		
							
								
								
									
										28
									
								
								CHANGELOG.md
									
									
									
									
									
								
							
							
						
						
									
										28
									
								
								CHANGELOG.md
									
									
									
									
									
								
							| @@ -388,7 +388,33 @@ | |||||||
|  |  | ||||||
| # v1.5.5 | # v1.5.5 | ||||||
|  |  | ||||||
| [Documentation](https://docs.k8s.io) & [Examples](https://releases.k8s.io/release-1.5.4/examples) | This release contains a fix for a PodSecurityPolicy vulnerability which allows users to make use of any existing PodSecurityPolicy object, even ones they are not authorized to use. | ||||||
|  |  | ||||||
|  | Other then that, this release contains no other changes from 1.5.4. | ||||||
|  |  | ||||||
|  | The vulnerability is tracked in http://issue.k8s.io/43459. | ||||||
|  |  | ||||||
|  | **Who is affected?** | ||||||
|  |  | ||||||
|  | Only Kubernetes 1.5.0-1.5.4 installations that do all of the following: | ||||||
|  | * Enable the PodSecurityPolicy API (which is not enabled by default): | ||||||
|  |   * `--runtime-config=extensions/v1beta1/podsecuritypolicy=true` | ||||||
|  | * Enable the PodSecurityPolicy admission plugin (which is not enabled by default): | ||||||
|  |   * `--admission-control=...,PodSecurityPolicy,...` | ||||||
|  | * Use authorization to limit users' ability to use specific PodSecurityPolicy objects | ||||||
|  |  | ||||||
|  | **What is the impact?** | ||||||
|  |  | ||||||
|  | A user that is authorized to create pods can make use of any existing PodSecurityPolicy, even ones they are not authorized to use. | ||||||
|  |  | ||||||
|  | **How can I mitigate this prior to installing 1.5.5?** | ||||||
|  |  | ||||||
|  | 1. Export existing PodSecurityPolicy objects: | ||||||
|  |   * `kubectl get podsecuritypolicies -o yaml > psp.yaml` | ||||||
|  | 2. Review and delete any PodSecurityPolicy objects you do not want all pod-creating users to be able to use (NOTE: Privileged users that were making use of those policies will also lose access to those policies). For example: | ||||||
|  |   * `kubectl delete podsecuritypolicies/my-privileged-policy` | ||||||
|  | 3. After upgrading to 1.5.5, re-create the exported PodSecurityPolicy objects: | ||||||
|  |   * `kubectl create -f psp.yaml` | ||||||
|  |  | ||||||
| ## Downloads for v1.5.5 | ## Downloads for v1.5.5 | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Kubernetes Submit Queue
					Kubernetes Submit Queue