* Re: Ask for suggestions for CVE-2019-12928
[not found] <74ca794a.6063.176f21e2fca.Coremail.18401698361@126.com>
@ 2021-01-11 16:22 ` Daniel P. Berrangé
2021-01-19 20:17 ` Dr. David Alan Gilbert
1 sibling, 0 replies; 3+ messages in thread
From: Daniel P. Berrangé @ 2021-01-11 16:22 UTC (permalink / raw)
To: 江芳杰; +Cc: qemu-devel, pjp
On Mon, Jan 11, 2021 at 11:43:53PM +0800, 江芳杰 wrote:
> Hi:
> Sorry to bother you~
> I have read the discussions about CVE--2019-12928 ( https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg01153.html).
> But, for the scenario of PC users, which is no requirement of network access to QMP, there are some mitigating proposes.
> 1. Modify the compilation options to disable QMP.
> 2. Modify command line parsing function to discard the QMP parameters with network configurations.
> 3. PC manager or other manage software make sure only the trusted user can use QMP.
> 4. Other ideas?
No code changes are required at all. The described scenario was simply a
user mis-configuration.
In rare case there can be valid reasons to use QMP on a public IP address,
but anyone doing so must ensure their usage is secure.
Regards,
Daniel
--
|: https://berrange.com -o- https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o- https://fstop138.berrange.com :|
|: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Ask for suggestions for CVE-2019-12928
[not found] <74ca794a.6063.176f21e2fca.Coremail.18401698361@126.com>
2021-01-11 16:22 ` Ask for suggestions for CVE-2019-12928 Daniel P. Berrangé
@ 2021-01-19 20:17 ` Dr. David Alan Gilbert
2021-01-20 7:59 ` Markus Armbruster
1 sibling, 1 reply; 3+ messages in thread
From: Dr. David Alan Gilbert @ 2021-01-19 20:17 UTC (permalink / raw)
To: 江芳杰; +Cc: berrange, qemu-devel, pjp
* 江芳杰 (18401698361@126.com) wrote:
> Hi:
> Sorry to bother you~
> I have read the discussions about CVE--2019-12928 ( https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg01153.html).
> But, for the scenario of PC users, which is no requirement of network access to QMP, there are some mitigating proposes.
> 1. Modify the compilation options to disable QMP.
> 2. Modify command line parsing function to discard the QMP parameters with network configurations.
> 3. PC manager or other manage software make sure only the trusted user can use QMP.
> 4. Other ideas?
QMP is a useful part of QEMU - so we don't want to do 1 - we need it to
let things control QEMU; including configuring complex setups.
The important part is (3) - anything that runs a qemu must make sure it
wires the QMP up securely; e.g. using unix sockets with appropriate
permissions or something like that.
As long as they do that, then we're fine.
Dave
--
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Ask for suggestions for CVE-2019-12928
2021-01-19 20:17 ` Dr. David Alan Gilbert
@ 2021-01-20 7:59 ` Markus Armbruster
0 siblings, 0 replies; 3+ messages in thread
From: Markus Armbruster @ 2021-01-20 7:59 UTC (permalink / raw)
To: Dr. David Alan Gilbert
Cc: 江芳杰, berrange, qemu-devel, pjp
"Dr. David Alan Gilbert" <dgilbert@redhat.com> writes:
> * 江芳杰 (18401698361@126.com) wrote:
>> Hi:
>> Sorry to bother you~
>> I have read the discussions about CVE--2019-12928 ( https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg01153.html).
>> But, for the scenario of PC users, which is no requirement of network access to QMP, there are some mitigating proposes.
>> 1. Modify the compilation options to disable QMP.
>> 2. Modify command line parsing function to discard the QMP parameters with network configurations.
>> 3. PC manager or other manage software make sure only the trusted user can use QMP.
>> 4. Other ideas?
>
> QMP is a useful part of QEMU - so we don't want to do 1 - we need it to
> let things control QEMU; including configuring complex setups.
Compiling out QMP gains you exactly nothing unless you also compile out
HMP. And then you're left without a way to monitor a running QEMU.
Similarly useful (but not nearly as secure) as not running QEMU at all
;)
> The important part is (3) - anything that runs a qemu must make sure it
> wires the QMP up securely; e.g. using unix sockets with appropriate
> permissions or something like that.
>
> As long as they do that, then we're fine.
Yup.
Regarding 4.: making insecure misconfiguration harder might be worth
exploring.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2021-01-20 8:00 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <74ca794a.6063.176f21e2fca.Coremail.18401698361@126.com>
2021-01-11 16:22 ` Ask for suggestions for CVE-2019-12928 Daniel P. Berrangé
2021-01-19 20:17 ` Dr. David Alan Gilbert
2021-01-20 7:59 ` Markus Armbruster
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).