From: "Philippe Mathieu-Daudé" <philmd@redhat.com>
To: Felipe Franciosi <felipe@nutanix.com>,
Ronnie Sahlberg <ronniesahlberg@gmail.com>,
Paolo Bonzini <pbonzini@redhat.com>, Peter Lieven <pl@kamp.de>,
"qemu-devel@nongnu.org" <qemu-devel@nongnu.org>,
"qemu-stable@nongnu.org" <qemu-stable@nongnu.org>,
"qemu-block@nongnu.org" <qemu-block@nongnu.org>
Cc: "Kevin Wolf" <kwolf@redhat.com>,
"Peter Turschmid" <peter.turschm@nutanix.com>,
"Max Reitz" <mreitz@redhat.com>,
"Raphael Norwitz" <raphael.norwitz@nutanix.com>,
"Stefan Hajnoczi" <stefanha@redhat.com>,
"Marc-André Lureau" <marcandre.lureau@redhat.com>,
"P J P" <ppandit@redhat.com>
Subject: Re: [PATCH] iscsi: Cap block count from GET LBA STATUS (CVE-2020-1711)
Date: Thu, 23 Jan 2020 18:46:25 +0100 [thread overview]
Message-ID: <3cb32404-e8ee-ba8c-3684-bfa6d0827d39@redhat.com> (raw)
In-Reply-To: <20200123124357.124019-1-felipe@nutanix.com>
On 1/23/20 1:44 PM, Felipe Franciosi wrote:
> When querying an iSCSI server for the provisioning status of blocks (via
> GET LBA STATUS), Qemu only validates that the response descriptor zero's
> LBA matches the one requested. Given the SCSI spec allows servers to
> respond with the status of blocks beyond the end of the LUN, Qemu may
> have its heap corrupted by clearing/setting too many bits at the end of
> its allocmap for the LUN.
>
> A malicious guest in control of the iSCSI server could carefully program
> Qemu's heap (by selectively setting the bitmap) and then smash it.
>
> This limits the number of bits that iscsi_co_block_status() will try to
> update in the allocmap so it can't overflow the bitmap.
>
Please add:
Fixes: CVE-2020-1711 (title of CVE if possible)
Cc: qemu-stable@nongnu.org
> Signed-off-by: Felipe Franciosi <felipe@nutanix.com>
> Signed-off-by: Peter Turschmid <peter.turschm@nutanix.com>
> Signed-off-by: Raphael Norwitz <raphael.norwitz@nutanix.com>
> ---
> block/iscsi.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
> diff --git a/block/iscsi.c b/block/iscsi.c
> index 2aea7e3f13..cbd57294ab 100644
> --- a/block/iscsi.c
> +++ b/block/iscsi.c
> @@ -701,7 +701,7 @@ static int coroutine_fn iscsi_co_block_status(BlockDriverState *bs,
> struct scsi_get_lba_status *lbas = NULL;
> struct scsi_lba_status_descriptor *lbasd = NULL;
> struct IscsiTask iTask;
> - uint64_t lba;
> + uint64_t lba, max_bytes;
> int ret;
>
> iscsi_co_init_iscsitask(iscsilun, &iTask);
> @@ -721,6 +721,7 @@ static int coroutine_fn iscsi_co_block_status(BlockDriverState *bs,
> }
>
> lba = offset / iscsilun->block_size;
> + max_bytes = (iscsilun->num_blocks - lba) * iscsilun->block_size;
>
> qemu_mutex_lock(&iscsilun->mutex);
> retry:
> @@ -764,7 +765,7 @@ retry:
> goto out_unlock;
> }
>
> - *pnum = (int64_t) lbasd->num_blocks * iscsilun->block_size;
> + *pnum = MIN((int64_t) lbasd->num_blocks * iscsilun->block_size, max_bytes);
>
> if (lbasd->provisioning == SCSI_PROVISIONING_TYPE_DEALLOCATED ||
> lbasd->provisioning == SCSI_PROVISIONING_TYPE_ANCHORED) {
>
What about this?
-- >8 --
diff --git a/block/iscsi.c b/block/iscsi.c
index 2aea7e3f13..25598accbb 100644
--- a/block/iscsi.c
+++ b/block/iscsi.c
@@ -506,6 +506,11 @@ iscsi_allocmap_update(IscsiLun *iscsilun, int64_t
offset,
/* shrink to touch only completely contained clusters */
cl_num_shrunk = DIV_ROUND_UP(offset, iscsilun->cluster_size);
nb_cls_shrunk = (offset + bytes) / iscsilun->cluster_size -
cl_num_shrunk;
+ if (nb_cls_expanded >= iscsilun->allocmap_size
+ || nb_cls_shrunk >= iscsilun->allocmap_size) {
+ error_report("iSCSI invalid request: ..." /* TODO */);
+ return;
+ }
if (allocated) {
bitmap_set(iscsilun->allocmap, cl_num_expanded, nb_cls_expanded);
} else {
---
next prev parent reply other threads:[~2020-01-23 19:29 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-01-23 12:44 [PATCH] iscsi: Cap block count from GET LBA STATUS (CVE-2020-1711) Felipe Franciosi
2020-01-23 16:59 ` Kevin Wolf
2020-01-28 12:30 ` Philippe Mathieu-Daudé
2020-01-28 12:42 ` Kevin Wolf
2020-02-05 14:22 ` Felipe Franciosi
2020-01-23 17:46 ` Philippe Mathieu-Daudé [this message]
2020-01-23 21:29 ` Felipe Franciosi
2020-01-23 22:58 ` Peter Lieven
2020-01-24 10:04 ` Philippe Mathieu-Daudé
2020-01-24 10:48 ` Felipe Franciosi
2020-01-24 13:39 ` Kevin Wolf
2020-01-24 13:42 ` Philippe Mathieu-Daudé
2020-01-24 13:52 ` Kevin Wolf
2020-01-24 14:24 ` Philippe Mathieu-Daudé
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=3cb32404-e8ee-ba8c-3684-bfa6d0827d39@redhat.com \
--to=philmd@redhat.com \
--cc=felipe@nutanix.com \
--cc=kwolf@redhat.com \
--cc=marcandre.lureau@redhat.com \
--cc=mreitz@redhat.com \
--cc=pbonzini@redhat.com \
--cc=peter.turschm@nutanix.com \
--cc=pl@kamp.de \
--cc=ppandit@redhat.com \
--cc=qemu-block@nongnu.org \
--cc=qemu-devel@nongnu.org \
--cc=qemu-stable@nongnu.org \
--cc=raphael.norwitz@nutanix.com \
--cc=ronniesahlberg@gmail.com \
--cc=stefanha@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).