-
Notifications
You must be signed in to change notification settings - Fork 41.1k
Update NodeRestriction to prevent nodes from updating their OwnerReferences #133467
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update NodeRestriction to prevent nodes from updating their OwnerReferences #133467
Conversation
Please note that we're already in Test Freeze for the Fast forwards are scheduled to happen every 6 hours, whereas the most recent run was: Mon Aug 11 10:25:10 UTC 2025. |
please do a PR for release-1.34 as well |
@SergeyKanzhelev Not needed, the |
/priority important-soon
|
@SergeyKanzhelev: /release-note-edit must be used with a single release note block. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
LGTM label has been added. Git tree hash: 2626337db60a97fbe958c801203db54015a55d51
|
/assign @tallclair @liggitt @deads2k cc @Vyom-Yadav i think we will need to mark this with 1.34 milestone |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: natherz97, SergeyKanzhelev, tallclair The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
yes, definitely. It's a security fix we're backporting to older minors, we don't want a gap in the fixed versions in 1.34.0 |
/milestone v1.34 |
What type of PR is this?
/kind bug
What this PR does / why we need it:
A vulnerability exists in the NodeRestriction admission controller where node users can delete their corresponding node object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection. This PR adds functionality to the NodeRestriction admission controller to prevent nodes from updating their OwnerReferences.
Which issue(s) this PR is related to:
N/A
Special notes for your reviewer:
This PR was authored by @SergeyKanzhelev