- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 23 for authorized (0.07 sec)
-
CHANGELOG/CHANGELOG-1.6.md
### RBAC * The `attributeRestrictions` field has been removed from the PolicyRule type in the rbac.authorization.k8s.io/v1alpha1 API. The field was not used by the RBAC authorizer. ([#39625](https://github.com/kubernetes/kubernetes/pull/39625), [@deads2k](https://github.com/deads2k))
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.33.md
object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection. By default, node users are authorized for create and patch requests but not delete requests against their node object. Since the NodeRestriction admission controller does not prevent patching OwnerReferences, a compromised node could leverage this vulnerability to delete and then recreate...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 10 01:15:24 UTC 2025 - 334.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
* Nodes must use client credentials that place them in the `system:nodes` group with a username of `system:node:<nodeName>` in order to be authorized by the node authorizer (the credentials obtained by the kubelet...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.34.md
Kube-apiserver: Added support for disabling caching of authorization webhook decisions in the `--authorization-config` file. The new fields `cacheAuthorizedRequests` and `cacheUnauthorizedRequests` could be set to `false` to prevent caching for authorized or unauthorized requests. See the https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. ([#129237](https://github.com/kubernetes/kubernetes/pull/129237), [@rfranzke](https://...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 10 01:13:50 UTC 2025 - 333.3K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.29.md
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Mar 12 00:36:01 UTC 2025 - 429.6K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.25.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Mon May 06 09:23:20 UTC 2024 - 419.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.11.md
* `list`/`watch` API requests with a `fieldSelector` that specifies `metadata.name` can now be authorized as requests for an individual named resource ([#63469](https://github.com/kubernetes/kubernetes/pull/63469), [@wojtek-t](https://github.com/wojtek-t))
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 328.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.9.md
* Add support for the webhook authorizer to make a Deny decision that short-circuits the union authorizer and immediately returns Deny. ([#53273](https://github.com/kubernetes/kubernetes/pull/53273), [@mikedanese](https://github.com/mikedanese))
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Nov 16 10:46:27 UTC 2021 - 313.7K bytes - Viewed (0)