v2 sent: 
https://lore.proxmox.com/pve-devel/20241104104221.228730-1-f.gruenbich...@proxmox.com

On August 9, 2024 1:22 pm, Fabian Grünbichler wrote:
> this series of patches implements additional hardening when copying
> potentially untrusted image files:
> - extend file_size_info helper which already does most of the work
> - add call to check imported volume in remote migration
> - add/adapt calls for `import-from` handling in Qemu
> 
> these are not problematic at the moment, and these patches just serve as
> additional hardening:
> - remote migration requires a special privilege, the source must already
>   be trusted
> - import-from only allows importing volumes already on the storage,
>   which are not untrusted but created by PVE itself, or by a user with
>   root privileges
> 
> the functionality in PVE::Storage should also be used for future
> additions where untrusted image files are processed:
> - Dominik's OVA import patch series
> - arbitrary disk image upload/download features
> 
> where not doing such checks might pose a security risk.
> 
> pve-guest-common:
> 
> Fabian Grünbichler (1):
>   storage tunnel: check just-imported image files
> 
>  src/PVE/StorageTunnel.pm | 7 +++++++
>  1 file changed, 7 insertions(+)
> 
> pve-storage:
> 
> Fabian Grünbichler (1):
>   file_size_info: implement untrusted mode
> 
>  src/PVE/Storage.pm        |  4 ++--
>  src/PVE/Storage/Plugin.pm | 35 ++++++++++++++++++++++++++++++-----
>  2 files changed, 32 insertions(+), 7 deletions(-)
> 
> qemu-server:
> 
> Fabian Grünbichler (1):
>   disk import: add additional safeguards for imported image files
> 
>  PVE/API2/Qemu.pm | 15 ++++++++++++---
>  1 file changed, 12 insertions(+), 3 deletions(-)
> 
> -- 
> 2.39.2
> 
> 
> 
> _______________________________________________
> pve-devel mailing list
> pve-devel@lists.proxmox.com
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
> 


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to