Thanks, that is a great reproducer.

Note that doing
   rm -rf /etc/ssl/private
   mkdir /etc/ssl/private

works around this, and explains why this *may* in fact be on purpose.  If you 
only do
    sudo chown ubuntu:ubuntu /etc/ssl/private

then the underlying directory is still owned by root and not readable by
ubuntu.  So this could be seen as allowing for an information leak,
although it seems like a stretch to me since root has to do the chown in
the first place.

It wasn't immediately obvious to me where in the code
(linux/ubuntu/aufs/) this is happening.

** Also affects: linux (Ubuntu)
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293549

Title:
  Filesystem mount from lxc template causes filesystem permission
  breakages

To manage notifications about this bug go to:
https://bugs.launchpad.net/juju-core/+bug/1293549/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to