Skip to content

Commit 9f27604

Browse files
Userland: Prevent a BuggieBox container from being exposed to /sys
/sys has lots of interesting information that an ordinary program in a container session shouldn't really care about, such as possible major and minor numbers of potentially exposed device files, etc. It seems like we don't really need /sys at the moment, so there's no harmful impact by this change. The risk of keeping /sys is probably low anyway, because, for example, a jailed process can't open most device files, even if it "sees" them in /sys. However, as another line of defense, let's just not mount /sys in such environment, if possible.
1 parent bed531a commit 9f27604

File tree

1 file changed

+0
-10
lines changed

1 file changed

+0
-10
lines changed

Base/usr/share/runc/full-buggiebox-container.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -118,16 +118,6 @@
118118
"source": null,
119119
"target": "/proc",
120120
"fs_type": "ProcFS"
121-
},
122-
{
123-
"type": "directory",
124-
"target": "/sys/"
125-
},
126-
{
127-
"type": "mount",
128-
"source": null,
129-
"target": "/sys",
130-
"fs_type": "SysFS"
131121
}
132122
]
133123
}

0 commit comments

Comments
 (0)