Skip to content
Discussion options

You must be logged in to vote

Tough to say. CAP_SYS_ADMIN is the most powerful Linux Capability, although far less capable in a Rootless Container. You do get the power over the usernamespace and most powerfully over the mount namespace.

We mount lots of file systems to block access to the host, which can be unmounted with CAP_SYS_ADMIN. So there is a chance of exposure for kernel file system attacks. You might be able to break out and do not have SELinux controls, on Debian. Not sure if AppArmor can be modified with CAP_SYS_ADMIN, but probably.

Bottom line it would still be difficult for malicious code to attack the users processes, but less so with CAP_SYS_ADMIN.

If you trust the code you are testing, I think this i…

Replies: 2 comments 7 replies

Comment options

You must be logged in to vote
5 replies
@smcv
Comment options

@smcv
Comment options

@smcv
Comment options

@rhatdan
Comment options

@smcv
Comment options

Answer selected by smcv
Comment options

You must be logged in to vote
2 replies
@smcv
Comment options

@smcv
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants