[pve-devel] [PATCH v2 storage/guest-common/qemu-server 0/3] harden import of file-based volumes
Fabian Grünbichler
f.gruenbichler at proxmox.com
Mon Nov 4 11:42:18 CET 2024
this series of patches implements additional hardening when copying
potentially untrusted image files:
- extend file_size_info helper which already does most of the work
- add call to check imported volume in remote migration
- add/adapt calls for `import-from` handling in Qemu
these are not problematic at the moment, and these patches just serve as
additional hardening:
- remote migration requires a special privilege, the source must already
be trusted
- import-from only allows importing volumes already on the storage,
which are not untrusted but created by PVE itself, or by a user with
root privileges
the functionality in PVE::Storage should also be used for future
additions where untrusted image files are processed:
- Dominik's OVA import patch series
- arbitrary disk image upload/download features
where not doing such checks might pose a security risk.
v1->v2:
- incorporate Fiona's feedback
pve-guest-common:
Fabian Grünbichler (1):
storage tunnel: check just-imported image files
src/PVE/StorageTunnel.pm | 8 ++++++++
1 file changed, 8 insertions(+)
pve-storage:
Fabian Grünbichler (1):
file_size_info: implement untrusted mode
src/PVE/Storage.pm | 4 ++--
src/PVE/Storage/Plugin.pm | 36 +++++++++++++++++++++++++++++++-----
2 files changed, 33 insertions(+), 7 deletions(-)
qemu-server:
Fabian Grünbichler (1):
disk import: add additional safeguards for imported image files
PVE/API2/Qemu.pm | 18 +++++++++++++++---
1 file changed, 15 insertions(+), 3 deletions(-)
--
2.39.5
More information about the pve-devel
mailing list