Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for runAsNonRoot (0.09 sec)

  1. CHANGELOG/CHANGELOG-1.23.md

        - [CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)](#cve-2022-3172-aggregated-api-server-can-cause-clients-to-be-redirected-ssrf)
        - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers)
      - [Changes by Kind](#changes-by-kind-6)
        - [Bug or Regression](#bug-or-regression-6)
      - [Dependencies](#dependencies-6)
        - [Added](#added-6)
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Feb 28 21:06:52 UTC 2023
    - 424.5K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.22.md

        - [CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)](#cve-2022-3172-aggregated-api-server-can-cause-clients-to-be-redirected-ssrf)
        - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers)
        - [Am I vulnerable?](#am-i-vulnerable)
          - [Affected Versions](#affected-versions)
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.24.md

        - [CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)](#cve-2022-3172-aggregated-api-server-can-cause-clients-to-be-redirected-ssrf)
        - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers)
        - [Am I vulnerable?](#am-i-vulnerable)
          - [Affected Versions](#affected-versions)
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.29.md

    - Added `UserNamespacesPodSecurityStandards` feature gate to enable user namespace support for Pod Security Standards.
      Enabling this feature will modify all Pod Security Standard rules to allow setting: `spec[.*].securityContext.[runAsNonRoot,runAsUser]`.
      This feature gate should only be enabled if all nodes in the cluster support the user namespace feature and have it enabled.
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Mar 12 00:36:01 UTC 2025
    - 429.6K bytes
    - Viewed (1)
  5. CHANGELOG/CHANGELOG-1.8.md

    * PodSecurityPolicy now recognizes pods that specify `runAsNonRoot: false` in their security context and does not overwrite the specified value ([#47073](https://github.com/kubernetes/kubernetes/pull/47073), [@Q-Lee](https://github.com/Q-Lee))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.25.md

    - UserName check for 'ContainerAdministrator' is now case-insensitive if runAsNonRoot is set to true on Windows. ([#111009](https://github.com/kubernetes/kubernetes/pull/111009), [@marosset](https://github.com/marosset))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
Back to top