File tree Expand file tree Collapse file tree 1 file changed +8
-0
lines changed
content/en/docs/concepts/security Expand file tree Collapse file tree 1 file changed +8
-0
lines changed Original file line number Diff line number Diff line change @@ -181,6 +181,14 @@ Users with control over `validatingwebhookconfigurations` or `mutatingwebhookcon
181
181
can control webhooks that can read any object admitted to the cluster, and in the case of
182
182
mutating webhooks, also mutate admitted objects.
183
183
184
+ ### Namespace modification
185
+
186
+ Users who can perform ** patch** operations on Namespace objects (through a namespaced RoleBinding to a Role with that access) can modify
187
+ labels on that namespace. In clusters where Pod Security Admission is used, this may allow a user to configure the namespace
188
+ for a more permissive policy than intended by the administrators.
189
+ For clusters where NetworkPolicy is used, users may be set labels that indirectly allow
190
+ access to services that an administrator did not intend to allow.
191
+
184
192
## Kubernetes RBAC - denial of service risks {#denial-of-service-risks}
185
193
186
194
### Object creation denial-of-service {#object-creation-dos}
You can’t perform that action at this time.
0 commit comments