-
Notifications
You must be signed in to change notification settings - Fork 158
Change /dev to be mounted by default with /noexec #725
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@mrunalp PTAL |
|
@runtime-tools-maintainers PTAL |
|
@ caniszczyk, @crosbymichael, @dqminh, @hqhq, @liangchenye, @Mashimiao, @mrunalp, @tianon, @vbatts,@vishh, @zhouhao3 PTAL |
|
For what it is worth, I ran this change through Podman's test suite with no failures. |
tianon
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, although I'm not sure whether many other projects are using this particular code? (I believe runc, containerd, etc all have their own versions of this)
|
Well it is used in Podman, Buildah, CRI-O. |
giuseppe
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
|
bah, Travis needs to be removed and switched to GitHub actions |
|
@caniszczyk ^ |
|
Let's merge this one only after #728 so we have CI. |
|
@rhatdan can you please rebase? This repo has CI now :) |
Podman had an issue, where someone was attemptig to mount all tmpfs within the container as noexec. They were able to get most of it done but "/dev", because it was done down in the runtime spec. I can think of no reason why "/dev", should not be mounted with noexec especially within a container. I know it is not mounted by default in Fedora that way, but I do not know why. Debian looks like it has made the change, and only one bug a couple of years ago showed issues, which would not apply to containers. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940171 Anyways this would make containers "slightly" more secure, and I think it is worth doing. Signed-off-by: Daniel J Walsh <[email protected]>
Podman had an issue, where someone was attemptig to mount all tmpfs
within the container as noexec. They were able to get most of it done
but "/dev", because it was done down in the runtime spec.
I can think of no reason why "/dev", should not be mounted with noexec
especially within a container. I know it is not mounted by default in
Fedora that way, but I do not know why.
Debian looks like it has made the change, and only one bug a couple of
years ago showed issues, which would not apply to containers.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940171
Anyways this would make containers "slightly" more secure, and I think it
is worth doing.
Signed-off-by: Daniel J Walsh [email protected]