Skip to content

Commit

Permalink
docs: warn about adding capabilities
Browse files Browse the repository at this point in the history
Closes: https://bugzilla.redhat.com/show_bug.cgi?id=2345676

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
  • Loading branch information
giuseppe committed Feb 18, 2025
1 parent e88ccec commit b43863a
Showing 1 changed file with 12 additions and 0 deletions.
12 changes: 12 additions & 0 deletions docs/source/markdown/options/cap-add.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,3 +5,15 @@
#### **--cap-add**=*capability*

Add Linux capabilities.

Granting additional capabilities increases the privileges of the
processes running inside the container and potentially allow it to
break out of confinement. Capabilities like `CAP_SYS_ADMIN`,
`CAP_SYS_PTRACE`, `CAP_MKNOD` and `CAP_SYS_MODULE` are particularly
dangerous when they are not used within a user namespace. Please
refer to **user_namespaces(7)** for a more detailed explanation of the
interaction between user namespaces and capabilities.

Before adding any capability, review its security implications and
ensure it is really necessary for the container’s functionality. See
**capabilities(7)** for more information.

0 comments on commit b43863a

Please sign in to comment.