summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorRichard W.M. Jones <rjones@redhat.com>2010-10-27 17:32:21 +0100
committerRichard W.M. Jones <rjones@redhat.com>2010-10-28 15:16:14 +0100
commitf93b234401093c63e67f2ffc254f611eee4daf7c (patch)
treef127846a9299eab96500a979f74793e4655baa17 /src
parente3851914de6bad3deb869ba865d2a6eb53c83151 (diff)
downloadlibguestfs-f93b234401093c63e67f2ffc254f611eee4daf7c.tar.gz
libguestfs-f93b234401093c63e67f2ffc254f611eee4daf7c.tar.xz
libguestfs-f93b234401093c63e67f2ffc254f611eee4daf7c.zip
doc: Warn about security implications of running commands.
Diffstat (limited to 'src')
-rw-r--r--src/guestfs.pod16
1 files changed, 16 insertions, 0 deletions
diff --git a/src/guestfs.pod b/src/guestfs.pod
index 305aa382..50e9f50b 100644
--- a/src/guestfs.pod
+++ b/src/guestfs.pod
@@ -390,6 +390,22 @@ an X86 host).
For SELinux guests, you may need to enable SELinux and load policy
first. See L</SELINUX> in this manpage.
+=item *
+
+I<Security:> It is not safe to run commands from untrusted, possibly
+malicious guests. These commands may attempt to exploit your program
+by sending unexpected output. They could also try to exploit the
+Linux kernel or qemu provided by the libguestfs appliance. They could
+use the network provided by the libguestfs appliance to bypass
+ordinary network partitions and firewalls. They could use the
+elevated privileges or different SELinux context of your program
+to their advantage.
+
+A secure alternative is to use libguestfs to install a "firstboot"
+script (a script which runs when the guest next boots normally), and
+to have this script run the commands you want in the normal context of
+the running guest, network security and so on.
+
=back
The two main API calls to run commands are L</guestfs_command> and