- Sort Score
- Result 10 results
- Languages All
Results 151 - 155 of 155 for reply (2.29 sec)
-
CHANGELOG/CHANGELOG-1.20.md
by this vulnerability if you run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. **Note**: This only impacts validating admission plugins that rely on old values in certain fields, and does not impact calls from kubelet that go through the built-in NodeRestriction admission plugin. **Affected Versions**: - kube-apiserver v1.20.0 - v1.20.5
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Jan 19 21:05:45 UTC 2022 - 409K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.28.md
http/2 requests from multiple clients share the same backend connection. An API server on a private network may choose not to enable the kube-apiserver mitigation to prevent performance regressions for unauthenticated clients. Authenticated requests rely on the fix in golang.org/x/net v0.17.0 alone. https://issue.k8s.io/121197 tracks further mitigation of http/2 attacks by authenticated clients. ([#121196](https://github.com/kubernetes/kubernetes/pull/121196), [@enj](https://github.com/enj)) [SIG API...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Fri Sep 05 03:47:18 UTC 2025 - 456.9K bytes - Viewed (1) -
docs/en/docs/release-notes.md
Additionally, a background task is normally an independent set of logic that should be handled separately, with its own resources (e.g. its own database connection). If you used to rely on this behavior, now you should create the resources for background tasks inside the background task itself, and use internally only data that doesn't depend on the resources of dependencies with `yield`.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 19:06:15 UTC 2025 - 586.7K bytes - Viewed (0) -
lib/fips140/v1.1.0-rc1.zip
read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput := new([SeedSize]byte) sysrand.Read(additionalInput[:16]) drbg := drbgInstance.Swap(nil) if drbg == nil { drbg = drbgPool.Get().(*Counter)...
Registered: Tue Dec 30 11:13:12 UTC 2025 - Last Modified: Thu Dec 11 16:27:41 UTC 2025 - 663K bytes - Viewed (0) -
lib/fips140/v1.0.0-c2097c7c.zip
read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput := new([SeedSize]byte) sysrand.Read(additionalInput[:16]) drbg := drbgs.Get().(*Counter) defer drbgs.Put(drbg) for len(b) > 0...
Registered: Tue Dec 30 11:13:12 UTC 2025 - Last Modified: Thu Sep 25 19:53:19 UTC 2025 - 642.7K bytes - Viewed (0)