Thanks, that is a great reproducer.
Note that doing
rm -rf /etc/ssl/private
mkdir /etc/ssl/private
works around this, and explains why this *may* in fact be on purpose. If you
only do
sudo chown ubuntu:ubuntu /etc/ssl/private
then the underlying directory is still owned by root and not readable by
ubuntu. So this could be seen as allowing for an information leak,
although it seems like a stretch to me since root has to do the chown in
the first place.
It wasn't immediately obvious to me where in the code
(linux/ubuntu/aufs/) this is happening.
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293549
Title:
Filesystem mount from lxc template causes filesystem permission
breakages
To manage notifications about this bug go to:
https://bugs.launchpad.net/juju-core/+bug/1293549/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs