Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 24 of 24 for Compacted (0.06 sec)

  1. CHANGELOG/CHANGELOG-1.22.md

    This issue has been rated low and assigned CVE-2021-25749
    
    ### Am I vulnerable?
    
    All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted
    
    #### Affected Versions
    
    - kubelet v1.20 - v1.21
    - kubelet v1.22.0 - v1.22.13
    - kubelet v1.23.0 - v1.23.10
    - kubelet v1.24.0 - v1.24.4
    
    ### How do I mitigate this vulnerability?
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  2. RELEASE.md

        `tf.compat.v1.image.extract_glimpse` does not change. The behavior of
        existing C++ kernel `ExtractGlimpse` does not change either, so saved models
        using `tf.raw_ops.ExtractGlimpse` will not be impacted.
    
    ## Known Caveats
    
    *   `tf.lite`
        *   Keras-based LSTM models must be converted with an explicit batch size in
            the input layer.
    
    ## Bug Fixes and Other Changes
    
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 20:54:38 UTC 2025
    - 740K bytes
    - Viewed (1)
  3. CHANGELOG/CHANGELOG-1.24.md

    This issue has been rated low and assigned CVE-2021-25749
    
    ### Am I vulnerable?
    
    All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted
    
    #### Affected Versions
    
    - kubelet v1.20 - v1.21
    - kubelet v1.22.0 - v1.22.13
    - kubelet v1.23.0 - v1.23.10
    - kubelet v1.24.0 - v1.24.4
    
    ### How do I mitigate this vulnerability?
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.19.md

    unschedulable from the candidate nodes. The service load balancer exclusion label should be used instead.
      
      Users upgrading from 1.18 who have cordoned nodes should set the `node.kubernetes.io/exclude-from-external-load-balancers` label on the impacted nodes before upgrading if they wish those nodes to remain excluded from service load balancers. ([#90823](https://github.com/kubernetes/kubernetes/pull/90823), [@smarterclayton](https://github.com/smarterclayton)) [SIG Apps, Cloud Provider and Network]...
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jan 05 05:42:32 UTC 2022
    - 489.7K bytes
    - Viewed (0)
Back to top