Change namespace privileges via unshare
Event Information
Meaning
- This event indicates that a process attempted to change its namespace privileges using the unshare system call in the Kubernetes cluster.
- It could potentially be a security concern as it may allow a process to gain elevated privileges or escape from container isolation.
- To investigate further, you can list all the processes running in the cluster namespace using the following kubectl command:
kubectl get pods --all-namespaces
Remediation
- Create a new ServiceAccount with restricted permissions in the target namespace:
- Bind the ServiceAccount to a Role with limited privileges:
- Finally, bind the Role to the ServiceAccount: