This depends on each clusters use case and you really need to assess
how you are using these features which had bugs but I can try to be of
help.
Repeating the issues below:
One allows containers using subpath volume mounts with any volume type
(including non-privileged pods, subject to file permissions) to access
files/directories outside of the volume, including the host’s
filesystem. See Kubernetes issue #60813 for details.
The other allows containers using a secret, configMap, projected or
downwardAPI volume to trigger deletion of arbitrary files/directories
from the nodes where they are running. See Kubernetes issue #60814 for
details.
If you are exposing the k8s api and such to individuals who are deemed
malicious, yes they might use this maliciously. If you are trusting
yaml for k8s configs from some untrusted source they may also use this
maliciously.
You need to assess what you are doing and how much you need to be
inclined to upgrade as soon as possible. It really depends.
> --
> You received this message because you are subscribed to the Google Groups
> "Kubernetes developer/contributor discussion" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
kubernetes-de...@googlegroups.com.
> To post to this group, send email to
kuberne...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/kubernetes-dev/6703259b-4df0-41d9-bebe-2e434205a18b%40googlegroups.com.
> For more options, visit
https://groups.google.com/d/optout.
--
Jessie Frazelle
4096R / D4C4 DD60 0D66 F65A 8EFC 511E 18F3 685C 0022 BFF3
pgp.mit.edu