
On 03/25/2013 10:25 AM, Paolo Bonzini wrote:
The <interface type='bridge'> is working mostly because of a bad design decision in Linux. Ideally, QEMU would run with an empty capability bounding set and would not be able to do any privileged operation (not even by running a helper program). This is not the case because dropping capabilities from the bounding set requires a capability of its own, CAP_SETPCAP; thus QEMU does *not* run with an empty bounding set if invoked via qemu:///session.
Ewww. So what you're saying is that the qemu that's run from qemu:///system is more locked down (and thus "more secure") than the qemu that's run from qemu:///session? Basically this qemu can run any setuid application it likes, and there's nothing that we can do about it.