File tree Expand file tree Collapse file tree 1 file changed +7
-0
lines changed
content/en/docs/concepts/security Expand file tree Collapse file tree 1 file changed +7
-0
lines changed Original file line number Diff line number Diff line change @@ -181,6 +181,13 @@ Users with control over `validatingwebhookconfigurations` or `mutatingwebhookcon
181
181
can control webhooks that can read any object admitted to the cluster, and in the case of
182
182
mutating webhooks, also mutate admitted objects.
183
183
184
+ ### Namespace modification
185
+
186
+ Users who can perform ` patch ` operations on ` namespace ` objects through a namespaced rolebinding can modify
187
+ labels on that namespace. In clusters where Pod Security Admission is used, this may allow a user to configure the namespace
188
+ for a more permissive policy than intended by the administrators. For clusters where network policy is used, users may be
189
+ able to gain access to services intended to be blocked.
190
+
184
191
## Kubernetes RBAC - denial of service risks {#denial-of-service-risks}
185
192
186
193
### Object creation denial-of-service {#object-creation-dos}
You can’t perform that action at this time.
0 commit comments