Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 31 for privilege (0.21 sec)

  1. CHANGELOG/CHANGELOG-1.25.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-2)
        - [Feature](#feature-2)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.28.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-10)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 23:47:59 UTC 2024
    - 408.3K bytes
    - Viewed (1)
  3. CHANGELOG/CHANGELOG-1.26.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-7)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 14 16:24:51 UTC 2024
    - 425.7K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.27.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-10)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 23:01:06 UTC 2024
    - 455.3K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.24.md

        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind)
        - [Feature](#feature)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  6. operator/pkg/apis/istio/v1alpha1/values_types.pb.go

    	// Enables privileged securityContext for the istio-proxy container.
    	//
    	// See https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
    	Privileged *wrapperspb.BoolValue `protobuf:"bytes,19,opt,name=privileged,proto3" json:"privileged,omitempty"`
    	// Sets the initial delay for readiness probes in seconds.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jun 03 01:55:05 UTC 2024
    - 329.6K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.17.md

    - kube-dns add-on:
      - All containers are now being executed under more restrictive privileges.
      - Most of the containers now run as non-root user and has the root filesystem set as read-only.
      - The remaining container running as root only has the minimum Linux capabilities it requires to run.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jan 28 10:44:33 UTC 2021
    - 346.2K bytes
    - Viewed (1)
  8. staging/src/k8s.io/api/core/v1/types_swagger_doc_generated.go

    	"privileged":               "Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows.",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 254.8K bytes
    - Viewed (0)
  9. pkg/apis/core/types.go

    	// +optional
    	Capabilities *Capabilities
    	// Run container in privileged mode.
    	// Processes in privileged containers are essentially equivalent to root on the host.
    	// Defaults to false.
    	// Note that this field cannot be set when spec.os.name is windows.
    	// +optional
    	Privileged *bool
    	// The SELinux context to be applied to the container.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 268.9K bytes
    - Viewed (0)
  10. staging/src/k8s.io/api/core/v1/generated.proto

      // +optional
      optional Capabilities capabilities = 1;
    
      // Run container in privileged mode.
      // Processes in privileged containers are essentially equivalent to root on the host.
      // Defaults to false.
      // Note that this field cannot be set when spec.os.name is windows.
      // +optional
      optional bool privileged = 2;
    
      // The SELinux context to be applied to the container.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 22:40:29 UTC 2024
    - 280.3K bytes
    - Viewed (0)
Back to top