Skip to content

Commit aafc373

Browse files
Merge pull request #25348 from giuseppe/warn-about-using-capabilities
docs: warn about adding capabilities
2 parents 62fd27b + b43863a commit aafc373

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

docs/source/markdown/options/cap-add.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,15 @@
55
#### **--cap-add**=*capability*
66

77
Add Linux capabilities.
8+
9+
Granting additional capabilities increases the privileges of the
10+
processes running inside the container and potentially allow it to
11+
break out of confinement. Capabilities like `CAP_SYS_ADMIN`,
12+
`CAP_SYS_PTRACE`, `CAP_MKNOD` and `CAP_SYS_MODULE` are particularly
13+
dangerous when they are not used within a user namespace. Please
14+
refer to **user_namespaces(7)** for a more detailed explanation of the
15+
interaction between user namespaces and capabilities.
16+
17+
Before adding any capability, review its security implications and
18+
ensure it is really necessary for the container’s functionality. See
19+
**capabilities(7)** for more information.

0 commit comments

Comments
 (0)