Updating with SEb's comments

Signed-off-by: Mary Anthony <mary@docker.com>
This commit is contained in:
Mary Anthony 2015-08-31 09:54:15 -07:00
parent b0fd4f882f
commit 95495d20be
1 changed files with 1 additions and 4 deletions

View File

@ -145,10 +145,7 @@ Because of [limitations in the `mount`
function](http://lists.linuxfoundation.org/pipermail/containers/2015-April/
035788.html), moving subdirectories within the host's source directory can give
access from the container to the host's file system. This requires a malicious
user on the host with root access or with access to the Docker socket. Access to
the Docker socket is equivalent to being privileged/root on the host. If your
systems defines a `docker` group, be aware all its members have the necessary
privileges to exploit this.
user with access to the mounted directory on the host.
>**Note**: The host directory is, by its nature, host-dependent. For this
>reason, you can't mount a host directory from `Dockerfile` because built images