Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Host File System Access #239

Open
Harry-R opened this issue Nov 29, 2021 · 1 comment
Open

Host File System Access #239

Harry-R opened this issue Nov 29, 2021 · 1 comment
Assignees

Comments

@Harry-R
Copy link
Contributor

Harry-R commented Nov 29, 2021

uhyve grants full host file system access from within the unikernel with the permissions of the user running uhyve. Thus, a malicious or compromised unikernel (application) could compromise the host system.
As one of the advertised security aspects of unikernels is their strong isolation against the host system and other unikernels, this is nothing one would expect from a hypervisor designed for a unikernel.
One possible solution would be to allow access only to a certain shared folder of which the path can be passed to uhyve on startup.
However, until this is fixed (or if the full host file system access is considered a feature and not a bug) it should be properly documented in the README file.

bors bot added a commit that referenced this issue Nov 29, 2021
240: README: Add warning about host file sytem access r=mkroening a=Harry-R

For details, see #239 

Co-authored-by: Leonard Rapp <[email protected]>
@stlankes
Copy link
Collaborator

stlankes commented May 2, 2022

You are right, we should describe a solution to avoid full filesystem access. In the future, runh is used to limit file system access. But here is also a description missing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Development

No branches or pull requests

3 participants