Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for escalation (0.62 sec)

  1. platforms/core-runtime/base-services/src/main/java/org/gradle/internal/SystemProperties.java

        }
    
        public String getLineSeparator() {
            return System.getProperty("line.separator");
        }
    
        /**
         * @deprecated Using the temporary directory on UNIX-based systems can lead to local privilege escalation or local sensitive information disclosure vulnerabilities.
         */
        @Deprecated
        @SuppressWarnings("InlineMeSuggester")
        public String getJavaIoTmpDir() {
            return System.getProperty("java.io.tmpdir");
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Wed May 29 06:47:40 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  2. plugin/pkg/admission/noderestriction/admission.go

    		}
    
    		// Don't allow a node to create its Node API object with the config source set.
    		// We scope node access to things listed in the Node.Spec, so allowing this would allow a view escalation.
    		if node.Spec.ConfigSource != nil {
    			return admission.NewForbidden(a, fmt.Errorf("node %q is not allowed to create pods with a non-nil configSource", nodeName))
    		}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 07 21:22:55 UTC 2024
    - 23.6K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/policy/v1beta1/generated.proto

      // process can gain more privileges than its parent process.
      // +optional
      optional bool defaultAllowPrivilegeEscalation = 15;
    
      // allowPrivilegeEscalation determines if a pod can request to allow
      // privilege escalation. If unspecified, defaults to true.
      // +optional
      optional bool allowPrivilegeEscalation = 16;
    
      // allowedHostPaths is an allowlist of host paths. Empty indicates
      // that all host paths may be used.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 19.6K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.28.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-10)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 23:47:59 UTC 2024
    - 408.3K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.25.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-2)
        - [Feature](#feature-2)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.27.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-10)
        - [API Change](#api-change-3)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 23:01:06 UTC 2024
    - 455.3K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.26.md

        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind-7)
        - [API Change](#api-change-2)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 14 16:24:51 UTC 2024
    - 425.7K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.24.md

        - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
        - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
      - [Changes by Kind](#changes-by-kind)
        - [Feature](#feature)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  9. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    					{MatchLabels: map[string]string{"rbac.authorization.k8s.io/aggregate-to-edit": "true"}},
    				},
    			},
    		},
    		{
    			// a role for namespace level viewing.  It grants Read-only access to non-escalating resources in
    			// a namespace.
    			ObjectMeta: metav1.ObjectMeta{Name: "view", Labels: map[string]string{"rbac.authorization.k8s.io/aggregate-to-edit": "true"}},
    			AggregationRule: &rbacv1.AggregationRule{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
Back to top