qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: "Philippe Mathieu-Daudé" <philmd@redhat.com>
To: Mauro Matteo Cascella <mcascell@redhat.com>
Cc: Qiang Liu <qiangliu@zju.edu.cn>,
	Prasad J Pandit <pjp@fedoraproject.org>,
	QEMU Developers <qemu-devel@nongnu.org>,
	Alexander Bulekov <alxndr@redhat.com>,
	Gerd Hoffmann <kraxel@redhat.com>, Gaoning Pan <pgn@zju.edu.cn>,
	Ziming Zhang <ezrakiez@gmail.com>,
	Salvatore Bonaccorso <carnil@debian.org>
Subject: Re: [PATCH] hw/display/ati_2d: Fix buffer overflow in ati_2d_blt (CVE-2021-3638)
Date: Thu, 9 Sep 2021 11:32:48 +0200	[thread overview]
Message-ID: <df8963c3-3485-af97-6589-02032fde11f8@redhat.com> (raw)
In-Reply-To: <CAA8xKjWiRn5a9a1oTX7gpZ3k867sO-nqMB_V5oJQNhwPSWZyrg@mail.gmail.com>

On 9/9/21 11:16 AM, Mauro Matteo Cascella wrote:
> On Tue, Sep 7, 2021 at 8:22 AM Philippe Mathieu-Daudé <philmd@redhat.com> wrote:
>> On 9/7/21 7:38 AM, Philippe Mathieu-Daudé wrote:
>>> On 9/6/21 9:52 PM, BALATON Zoltan wrote:
>>>> I don't think assigning a CVE to a bug that is in an experimental and
>>>> largely unused part and happens when one enables debug code really worth
>>>> the hassle, this could be handled as a normal bug. As long as the
>>>
>>> CVE assignment can happens outside of QEMU community, we try to make it
>>> clear what is the "security boundary" but researchers filling CVEs
>>> might not understand it well.
>>
>> BTW see commit b317006a3f1 ("docs/secure-coding-practices: Describe how
>> to use 'null-co' block driver") which is related to your suggestion.
> 
> I agree we can avoid assigning CVEs to ati-vga and similar
> experimental devices that are not intended to be used in production,
> even if they fall under the virtualization use case. Maybe we can
> improve the documentation
> (https://qemu-project.gitlab.io/qemu/system/security.html) to clearly
> state that some devices are not security supported? Would it be
> possible/feasible to get a list of such devices? Or maybe the other
> way around, document the list of devices that are undeniably security
> supported (e.g., virtio*, *hci, e1000, etc.)?

I just posted a suggestion as RFC but forgot to Cc you:
"security: Introduce qemu_security_policy_taint() API"
https://lore.kernel.org/qemu-devel/20210908232024.2399215-1-philmd@redhat.com/
In particular for the ati-vga device:
https://lore.kernel.org/qemu-devel/20210908232024.2399215-8-philmd@redhat.com/



  reply	other threads:[~2021-09-09  9:33 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-09-06 15:31 [PATCH] hw/display/ati_2d: Fix buffer overflow in ati_2d_blt (CVE-2021-3638) Philippe Mathieu-Daudé
2021-09-06 16:44 ` Mauro Matteo Cascella
2021-09-06 18:19   ` Philippe Mathieu-Daudé
2021-09-06 19:19     ` Alexander Bulekov
2021-09-07  5:42       ` Philippe Mathieu-Daudé
2021-09-06 19:52     ` BALATON Zoltan
2021-09-07  5:38       ` Philippe Mathieu-Daudé
2021-09-07  6:22         ` Philippe Mathieu-Daudé
2021-09-09  9:16           ` Mauro Matteo Cascella
2021-09-09  9:32             ` Philippe Mathieu-Daudé [this message]
2021-09-07  6:19 ` Philippe Mathieu-Daudé
2022-08-30 10:32   ` Qiang Liu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=df8963c3-3485-af97-6589-02032fde11f8@redhat.com \
    --to=philmd@redhat.com \
    --cc=alxndr@redhat.com \
    --cc=carnil@debian.org \
    --cc=ezrakiez@gmail.com \
    --cc=kraxel@redhat.com \
    --cc=mcascell@redhat.com \
    --cc=pgn@zju.edu.cn \
    --cc=pjp@fedoraproject.org \
    --cc=qemu-devel@nongnu.org \
    --cc=qiangliu@zju.edu.cn \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).