moby/daemon/graphdriver/zfs
Brian Goff 93ac040bf0 Lock down docker root dir perms.
Do not use 0701 perms.
0701 dir perms allows anyone to traverse the docker dir.
It happens to allow any user to execute, as an example, suid binaries
from image rootfs dirs because it allows traversal AND critically
container users need to be able to do execute things.

0701 on lower directories also happens to allow any user to modify
     things in, for instance, the overlay upper dir which neccessarily
     has 0755 permissions.

This changes to use 0710 which allows users in the group to traverse.
In userns mode the UID owner is (real) root and the GID is the remapped
root's GID.

This prevents anyone but the remapped root to traverse our directories
(which is required for userns with runc).

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
(cherry picked from commit ef7237442147441a7cadcda0600be1186d81ac73)
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2021-08-19 20:40:15 +00:00
..
MAINTAINERS zfs: add myself to MAINTAINERS 2015-05-08 17:48:20 +02:00
zfs.go Lock down docker root dir perms. 2021-08-19 20:40:15 +00:00
zfs_freebsd.go Standardized log messages accross the different storage drivers. 2018-03-27 14:37:30 +02:00
zfs_linux.go Standardized log messages accross the different storage drivers. 2018-03-27 14:37:30 +02:00
zfs_test.go Add canonical import comment 2018-02-05 16:51:57 -05:00
zfs_unsupported.go Add canonical import comment 2018-02-05 16:51:57 -05:00