- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 29 for lead (0.04 seconds)
-
CHANGELOG/CHANGELOG-1.13.md
* Allow disable outbound SNAT when Azure standard load balancer is used together with outbound rules. ([#75282](https://github.com/kubernetes/kubernetes/pull/75282), [@feiskyer](https://github.com/feiskyer))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 273.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.33.md
yet present, thus enforcing authentication / re-authentication. This means an image pull might be attempted even in cases where a pod requests the `IfNotPresent` image pull policy, and might lead to the pod not starting if its pull policy is `Never` and is unable to present authentication information that lead to a previous successful pull of the image it is requesting. ([#128152](https://github.com/kubernetes/kubernetes/pull/128152), [@stlaz](https://github.com/stlaz)) [SIG API Machinery, Architecture,...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Mar 19 03:17:58 GMT 2026 - 369K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.27.md
- [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind-11)Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jul 17 07:48:22 GMT 2024 - 466.3K bytes - Click Count (2) -
CHANGELOG/CHANGELOG-1.28.md
- [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind-14)Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Fri Sep 05 03:47:18 GMT 2025 - 456.9K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.24.md
- [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind) - [Feature](#feature)Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.30.md
- `readOnly` volumes now support recursive read-only mounts for kernel versions >= 5.12." ([#123180](https://github.com/kubernetes/kubernetes/pull/123180), [@AkihiroSuda](https://github.com/AkihiroSuda)) - cri-api: Implemented KEP-3857: Recursive Read-only (RRO) mounts.
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jun 18 18:59:10 GMT 2025 - 398.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.23.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.29.md
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Mar 12 00:36:01 GMT 2025 - 429.6K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.16.md
### Cloud Provider
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Oct 23 20:13:20 GMT 2024 - 345.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.22.md
This release contains changes that address the following vulnerabilities: ### CVE-2022-3162: Unauthorized read of Custom Resources A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group they are not authorized to read. **Affected Versions**: - kube-apiserver v1.25.0 - v1.25.3
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0)