Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 31 for discovered (0.27 sec)

  1. CHANGELOG/CHANGELOG-1.25.md

    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.24.md

    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation
    
    A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
    
    **Affected Versions**:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.27.md

    - Resolves a spurious "Unknown discovery response content-type" error in client-go discovery requests by tolerating extra content-type parameters in API responses ([#117637](https://github.com/kubernetes/kubernetes/pull/117637), [@seans3](https://github.com/seans3)) [SIG API Machinery]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 23:01:06 UTC 2024
    - 455.3K bytes
    - Viewed (0)
  4. doc/go_spec.html

    it is impossible to change the contents of a string.
    The predeclared string type is <code>string</code>;
    it is a <a href="#Type_definitions">defined type</a>.
    </p>
    
    <p>
    The length of a string <code>s</code> can be discovered using
    the built-in function <a href="#Length_and_capacity"><code>len</code></a>.
    The length is a compile-time constant if the string is a constant.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 04 21:07:21 UTC 2024
    - 281.5K bytes
    - Viewed (1)
  5. CHANGELOG/CHANGELOG-1.28.md

    - Resolves a spurious "Unknown discovery response content-type" error in client-go discovery requests by tolerating extra content-type parameters in API responses ([#117571](https://github.com/kubernetes/kubernetes/pull/117571), [@seans3](https://github.com/seans3)) [SIG API Machinery]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 23:47:59 UTC 2024
    - 408.3K bytes
    - Viewed (1)
  6. CHANGELOG/CHANGELOG-1.26.md

    - Resolves a spurious "Unknown discovery response content-type" error in client-go discovery requests by tolerating extra content-type parameters in API responses ([#117638](https://github.com/kubernetes/kubernetes/pull/117638), [@seans3](https://github.com/seans3)) [SIG API Machinery]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 14 16:24:51 UTC 2024
    - 425.7K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.22.md

    ## Important Security Information
    
    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.13.md

    - Fixed cluster autoscaler addon permissions so it can access batch/job. ([#69858](https://github.com/kubernetes/kubernetes/pull/69858), [@losipiuk](https://github.com/losipiuk))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 273.1K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.23.md

    ## Important Security Information
    
    This release contains changes that address the following vulnerabilities:
    
    ### CVE-2022-3162: Unauthorized read of Custom Resources
    
    A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read.
    
    **Affected Versions**:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 28 21:06:52 UTC 2023
    - 424.5K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.8.md

    * Dynamic Flexvolume plugin discovery. Flexvolume plugins can now be discovered on the fly rather than only at system initialization time. ([#50031](https://github.com/kubernetes/kubernetes/pull/50031), [@verult](https://github.com/verult))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
Back to top