Skip to content

Merge master into feature/trusted-certs#7043

Merged
minglumlu merged 13 commits intoxapi-project:feature/trusted-certsfrom
minglumlu:private/mingl/feature/trusted-certs
Apr 29, 2026
Merged

Merge master into feature/trusted-certs#7043
minglumlu merged 13 commits intoxapi-project:feature/trusted-certsfrom
minglumlu:private/mingl/feature/trusted-certs

Conversation

@minglumlu
Copy link
Copy Markdown
Member

No description provided.

changlei-li and others added 13 commits April 22, 2026 13:34
Signed-off-by: Changlei Li <changlei.li@citrix.com>
A mistake in xapi-project#6795 that
breaks quicktest.
There is no use case for it anymore.

This is part of XSA-489 / CVE-2026-23559.

Signed-off-by: Rob Hoes <rob.hoes@citrix.com>
This code is either obsolete or should use a first-class field (TBD).

This is part of XSA-489 / CVE-2026-23560.

Signed-off-by: Rob Hoes <rob.hoes@citrix.com>
This code is either obsolete or should use a first-class field (TBD).

This is part of XSA-489 / CVE-2026-23560.
There is no use case for it anymore.

This is part of XSA-489 / CVE-2026-23559.
This code is either obsolete or should use a first-class field (TBD).

This is part of XSA-489 / CVE-2026-23561.

Signed-off-by: Rob Hoes <rob.hoes@citrix.com>
…oject#7033)

This code is either obsolete or should use a first-class field (TBD).

This is part of XSA-489 / CVE-2026-23561.
map_keys_roles parameter was RBAC checked for
{add_to,remove_from}_other_config, but set_other_config allowed
circumventing this check.

Since VM is the only object that has a key ("pci") in other_config
with the privilege level required for modification higher than that of the
other_config field generally, this meant that vm-admin could not modify the
"pci" key in other_config through add_to_other_config, but could circumvent the
check with set_other_config.

Implement a checker for VM.other_config setters based on Task's manual RBAC
checker (introduced in a3f2c6e)

This is part of XSA-489 / CVE-2026-23562

Signed-off-by: Andrii Sultanov <andriy.sultanov@vates.tech>
platform:hvm_serial and other_config:hvm_serial are both keys that allow host
filesystem write. Limit these to be modifiable only by pool-admin.

Implement set_platform with Helpers.set_map_with_rbac, like for
set_other_config.

This is part of XSA-489 / CVE-2026-42486

Signed-off-by: Andrii Sultanov <andriy.sultanov@vates.tech>
The only difference in the schematest comes from changing the type of the
other_config and platform fields from RW to StaticRO, which is necessary to
provide custom implementations of setters.

With a modified schematest, the diff is:

    <     "qualifier": "RW",
    ---
    >     "qualifier": "StaticRO",

Signed-off-by: Andrii Sultanov <andriy.sultanov@vates.tech>
…M.platform` (xapi-project#7039)

Add per-key RBAC checking for `VM.platform` and `VM.other_config`, to
cover a case where a lower-prileged user could circumvent permission
checks on `other_config:{pci,hvm_serial}` and `platform:hvm_serial`.

Introduces a generic per-key RBAC checker for map setters based on
Task's manual RBAC checker (introduced in
xapi-project@a3f2c6e).
Uses it for the fields above.

This is part of XSA-489 / CVE-2026-23562 and CVE-2026-42486
@minglumlu minglumlu merged commit 7e80ad2 into xapi-project:feature/trusted-certs Apr 29, 2026
16 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants