Skip to content

Conversation

@rhatdan
Copy link
Contributor

@rhatdan rhatdan commented Sep 24, 2021

Podman had an issue, where someone was attemptig to mount all tmpfs
within the container as noexec. They were able to get most of it done
but "/dev", because it was done down in the runtime spec.

I can think of no reason why "/dev", should not be mounted with noexec
especially within a container. I know it is not mounted by default in
Fedora that way, but I do not know why.

Debian looks like it has made the change, and only one bug a couple of
years ago showed issues, which would not apply to containers.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940171

Anyways this would make containers "slightly" more secure, and I think it
is worth doing.

Signed-off-by: Daniel J Walsh [email protected]

@rhatdan
Copy link
Contributor Author

rhatdan commented Sep 24, 2021

@mrunalp PTAL

@rhatdan
Copy link
Contributor Author

rhatdan commented Sep 24, 2021

@runtime-tools-maintainers PTAL

@rhatdan
Copy link
Contributor Author

rhatdan commented Sep 24, 2021

@rhatdan
Copy link
Contributor Author

rhatdan commented Sep 24, 2021

For what it is worth, I ran this change through Podman's test suite with no failures.
containers/podman#11349

Copy link
Member

@tianon tianon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, although I'm not sure whether many other projects are using this particular code? (I believe runc, containerd, etc all have their own versions of this)

@rhatdan
Copy link
Contributor Author

rhatdan commented Sep 25, 2021

Well it is used in Podman, Buildah, CRI-O.

@mrunalp
Copy link
Contributor

mrunalp commented Sep 26, 2021

LGTM

Approved with PullApprove

Copy link
Member

@giuseppe giuseppe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@vbatts
Copy link
Member

vbatts commented Sep 28, 2021

bah, Travis needs to be removed and switched to GitHub actions

@amye
Copy link

amye commented Sep 29, 2021

@caniszczyk ^
TravisCI is blocking things

@kolyshkin
Copy link
Contributor

bah, Travis needs to be removed and switched to GitHub actions

PTAL #727, #728 @vbatts

@kolyshkin
Copy link
Contributor

Let's merge this one only after #728 so we have CI.

@kolyshkin
Copy link
Contributor

@rhatdan can you please rebase? This repo has CI now :)

Podman had an issue, where someone was attemptig to mount all tmpfs
within the container as noexec. They were able to get most of it done
but "/dev", because it was done down in the runtime spec.

I can think of no reason why "/dev", should not be mounted with noexec
especially within a container.  I know it is not mounted by default in
Fedora that way, but I do not know why.

Debian looks like it has made the change, and only one bug a couple of
years ago showed issues, which would not apply to containers.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940171

Anyways this would make containers "slightly" more secure, and I think it
is worth doing.

Signed-off-by: Daniel J Walsh <[email protected]>
@vbatts vbatts merged commit 744b5ee into opencontainers:master Oct 22, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants