[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

qemu-user viability (was Re: [SECURITY] [DSA 5983-1] qemu security update)



(Cc porters, for the arches where some buildds use qemu-user)

On Sat, 23 Aug 2025, Michael Tokarev wrote:

>> Does this entirely break things like running sudo within a
>> qemu-user-emulated chroot (or buildd/cowbuilder/schroot)?

> It discontinues elevating (changing) privileges using qemu-user binfmt
> handler.  Things like /foreign/chroot//bin/su and /foreign/chroot/bin/sudo
> does not work anymore.  If you run sudo /foreign/chroot/bin/bash,
> your bash will continue run as root under qemu-user, as before.

But the use case is:

prompt> chroot /foreign/chroot su - user
chroot> do something
chroot> sudo do something else   # this step
[…]
chroot> exit

This needs to work, or at least be enablable (with a documentation
in at least README.Debian, with a NEWS.Debian entry pointing to it
saying precisely how, not vague “this will require changes to your
deployment”).

> There are no alternatives - qemu is unique in this regard.  And
> it has never been designed for this usage.  What we had for 15+
> years, unnoticed, is like `chmod u+s /bin/sh`, which is never
> supposed to be used like this.

Perhaps, but there’s shades in between.

> If you rely on suid/sgid *foreign* binaries, that's where the
> problem lies.

Yes. People expect to be able to run foreign-arch chroots.
Entire buildd setups partly rely on this, too…

> I'm sorry if you disappointed you, but here's how things work.

That is a bad cop-out.

> As stated in the announcement, if you relied on this feature,
> you have to rework your setup.

And that is both too vague and not in README.Debian so that
people installing qemu-user later can find that.


Reply to: