qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
* Re: Ask for suggestions for CVE-2019-12928
       [not found] <74ca794a.6063.176f21e2fca.Coremail.18401698361@126.com>
@ 2021-01-11 16:22 ` Daniel P. Berrangé
  2021-01-19 20:17 ` Dr. David Alan Gilbert
  1 sibling, 0 replies; 3+ messages in thread
From: Daniel P. Berrangé @ 2021-01-11 16:22 UTC (permalink / raw)
  To: 江芳杰; +Cc: qemu-devel, pjp

On Mon, Jan 11, 2021 at 11:43:53PM +0800, 江芳杰 wrote:
> Hi:
>     Sorry to bother you~
>     I have read the discussions about CVE--2019-12928 ( https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg01153.html).
> But, for the scenario of PC users, which is no requirement of network access to QMP, there are some mitigating proposes.
> 1. Modify the compilation options to disable QMP.
> 2. Modify command line parsing function to discard the QMP parameters with network configurations.
> 3. PC manager or other manage software make sure only the trusted user can use QMP.
> 4. Other ideas?

No code changes are required at all. The described scenario was simply a
user mis-configuration.

In rare case there can be valid reasons to use QMP on a public IP address,
but anyone doing so must ensure their usage is secure.

Regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Ask for suggestions for CVE-2019-12928
       [not found] <74ca794a.6063.176f21e2fca.Coremail.18401698361@126.com>
  2021-01-11 16:22 ` Ask for suggestions for CVE-2019-12928 Daniel P. Berrangé
@ 2021-01-19 20:17 ` Dr. David Alan Gilbert
  2021-01-20  7:59   ` Markus Armbruster
  1 sibling, 1 reply; 3+ messages in thread
From: Dr. David Alan Gilbert @ 2021-01-19 20:17 UTC (permalink / raw)
  To: 江芳杰; +Cc: berrange, qemu-devel, pjp

* 江芳杰 (18401698361@126.com) wrote:
> Hi:
>     Sorry to bother you~
>     I have read the discussions about CVE--2019-12928 ( https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg01153.html).
> But, for the scenario of PC users, which is no requirement of network access to QMP, there are some mitigating proposes.
> 1. Modify the compilation options to disable QMP.
> 2. Modify command line parsing function to discard the QMP parameters with network configurations.
> 3. PC manager or other manage software make sure only the trusted user can use QMP.
> 4. Other ideas?

QMP is a useful part of QEMU - so we don't want to do 1 - we need it to
let things control QEMU; including configuring complex setups.

The important part is (3) - anything that runs a qemu must make sure it
wires the QMP up securely; e.g. using unix sockets with appropriate
permissions or something like that.

As long as they do that, then we're fine.

Dave

-- 
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Ask for suggestions for CVE-2019-12928
  2021-01-19 20:17 ` Dr. David Alan Gilbert
@ 2021-01-20  7:59   ` Markus Armbruster
  0 siblings, 0 replies; 3+ messages in thread
From: Markus Armbruster @ 2021-01-20  7:59 UTC (permalink / raw)
  To: Dr. David Alan Gilbert
  Cc: 江芳杰, berrange, qemu-devel, pjp

"Dr. David Alan Gilbert" <dgilbert@redhat.com> writes:

> * 江芳杰 (18401698361@126.com) wrote:
>> Hi:
>>     Sorry to bother you~
>>     I have read the discussions about CVE--2019-12928 ( https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg01153.html).
>> But, for the scenario of PC users, which is no requirement of network access to QMP, there are some mitigating proposes.
>> 1. Modify the compilation options to disable QMP.
>> 2. Modify command line parsing function to discard the QMP parameters with network configurations.
>> 3. PC manager or other manage software make sure only the trusted user can use QMP.
>> 4. Other ideas?
>
> QMP is a useful part of QEMU - so we don't want to do 1 - we need it to
> let things control QEMU; including configuring complex setups.

Compiling out QMP gains you exactly nothing unless you also compile out
HMP.  And then you're left without a way to monitor a running QEMU.
Similarly useful (but not nearly as secure) as not running QEMU at all
;)

> The important part is (3) - anything that runs a qemu must make sure it
> wires the QMP up securely; e.g. using unix sockets with appropriate
> permissions or something like that.
>
> As long as they do that, then we're fine.

Yup.

Regarding 4.: making insecure misconfiguration harder might be worth
exploring.



^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2021-01-20  8:00 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <74ca794a.6063.176f21e2fca.Coremail.18401698361@126.com>
2021-01-11 16:22 ` Ask for suggestions for CVE-2019-12928 Daniel P. Berrangé
2021-01-19 20:17 ` Dr. David Alan Gilbert
2021-01-20  7:59   ` Markus Armbruster

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).