Fix perms for virConnectDomainXML{To,From}Native (CVE-2013-4401)
authorDaniel P. Berrange <berrange@redhat.com>
Thu, 3 Oct 2013 15:37:57 +0000 (16:37 +0100)
committerDaniel P. Berrange <berrange@redhat.com>
Mon, 21 Oct 2013 13:18:31 +0000 (14:18 +0100)
commit1adbe4faa952d8aaba58faa7d9b8bd7164aafbe6
treeea406c800b49631a28abadbefa6f001716d14323
parent2503a07480bbe24e2978ba6e7dae9d49d989132b
Fix perms for virConnectDomainXML{To,From}Native (CVE-2013-4401)

The virConnectDomainXMLToNative API should require 'connect:write'
not 'connect:read', since it will trigger execution of the QEMU
binaries listed in the XML.

Also make virConnectDomainXMLFromNative API require a full
read-write connection and 'connect:write' permission. Although the
current impl doesn't trigger execution of QEMU, we should not
rely on that impl detail from an API permissioning POV.

Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
(cherry picked from commit 57687fd6bf7f6e1b3662c52f3f26c06ab19dc96c)
src/libvirt.c
src/remote/remote_protocol.x