From 95495d20bec49ae338e6fc10f5d4be71bd162370 Mon Sep 17 00:00:00 2001 From: Mary Anthony Date: Mon, 31 Aug 2015 09:54:15 -0700 Subject: [PATCH] Updating with SEb's comments Signed-off-by: Mary Anthony --- docs/userguide/dockervolumes.md | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/docs/userguide/dockervolumes.md b/docs/userguide/dockervolumes.md index f2572422fa..f210dddaf0 100644 --- a/docs/userguide/dockervolumes.md +++ b/docs/userguide/dockervolumes.md @@ -145,10 +145,7 @@ Because of [limitations in the `mount` function](http://lists.linuxfoundation.org/pipermail/containers/2015-April/ 035788.html), moving subdirectories within the host's source directory can give access from the container to the host's file system. This requires a malicious -user on the host with root access or with access to the Docker socket. Access to -the Docker socket is equivalent to being privileged/root on the host. If your -systems defines a `docker` group, be aware all its members have the necessary -privileges to exploit this. +user with access to the mounted directory on the host. >**Note**: The host directory is, by its nature, host-dependent. For this >reason, you can't mount a host directory from `Dockerfile` because built images