[pve-devel] Running KVM as root is a security issue

Alexandre DERUMIER aderumier at odiso.com
Mon Jul 27 16:07:10 CEST 2015


>>Yes, that much I've tested, too. I'm worried about the shutdown scripts
>>though (bridgedown). They might lack permissions if qemu doesn't keep a
>>privileged parent process around for those.

I think that pci passthrough need root access too. (maybe not with vfio).

Not sure about disks with /dev/ mapping ?



----- Mail original -----
De: "Wolfgang Bumiller" <w.bumiller at proxmox.com>
À: "Eric Blevins" <ericlb100 at gmail.com>
Cc: "pve-devel" <pve-devel at pve.proxmox.com>
Envoyé: Lundi 27 Juillet 2015 15:53:00
Objet: Re: [pve-devel] Running KVM as root is a security issue

> A patch exists to prevent a crash when a socket cannot be opened. 
> https://lists.gnu.org/archive/html/qemu-devel/2015-05/msg00577.html 

Included in the current 2.4 devel build. 

> I've done some experimenting. If I take the KVM command as generated 
> by Proxmox and simply add "-runas nobody" the VM starts up and runs 
> without a problem. 

Yes, that much I've tested, too. I'm worried about the shutdown scripts 
though (bridgedown). They might lack permissions if qemu doesn't keep a 
privileged parent process around for those. 

Ideally the VM can be started directly as a user, though, rather than 
using the -runas switch. That will be some work though. 

_______________________________________________ 
pve-devel mailing list 
pve-devel at pve.proxmox.com 
http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel 



More information about the pve-devel mailing list