Hi everyone,
I have a question regarding a specific security scenario in Proxmox:
Suppose the Proxmox host has Linux Kernel CPU Patches disabled.
Now, assume that the VMs are configured with CPU type = kvm64, which is a simplified and virtual CPU model without exposing most modern CPU features to the guest.
In this setup, is it still possible for a malicious or compromised VM to escape and attack the host via known CPU vulnerabilities, even though the guest is using kvm64?
In other words:
Does using KVM64 on the guest side effectively shield the host from speculative execution attacks initiated within a VM?
Or does disabling Linux Kernel CPU Patches disabled on the host still leave it exposed to certain attacks, regardless of the virtual CPU type presented to guests?
Also, how about other types like x86-64-v2-AES or x86-64-v3?
Any clarification on how much protection KVM64 offers in this context would be greatly appreciated.
I have a question regarding a specific security scenario in Proxmox:
Suppose the Proxmox host has Linux Kernel CPU Patches disabled.
Now, assume that the VMs are configured with CPU type = kvm64, which is a simplified and virtual CPU model without exposing most modern CPU features to the guest.
In this setup, is it still possible for a malicious or compromised VM to escape and attack the host via known CPU vulnerabilities, even though the guest is using kvm64?
In other words:
Does using KVM64 on the guest side effectively shield the host from speculative execution attacks initiated within a VM?
Or does disabling Linux Kernel CPU Patches disabled on the host still leave it exposed to certain attacks, regardless of the virtual CPU type presented to guests?
Also, how about other types like x86-64-v2-AES or x86-64-v3?
Any clarification on how much protection KVM64 offers in this context would be greatly appreciated.