From: Paolo Bonzini <pbonzini@redhat.com>
To: Li Qiang <liq3ea@gmail.com>
Cc: kwolf@redhat.com, keith.busch@intel.com, mreitz@redhat.com,
P J P <ppandit@redhat.com>,
qemu-block@nongnu.org, Qemu Developers <qemu-devel@nongnu.org>
Subject: Re: [Qemu-devel] [PATCH] nvme: fix oob access issue(CVE-2018-16847)
Date: Thu, 15 Nov 2018 19:10:38 +0100 [thread overview]
Message-ID: <ff40a572-18a1-1609-450f-b1b8e99ed3d5@redhat.com> (raw)
In-Reply-To: <CAKXe6S+Atz0M9NgUEuuN-2e5XDUyGMA0Ser7kipy1yfvuLguSA@mail.gmail.com>
On 15/11/2018 04:14, Li Qiang wrote:
>
>
> Paolo Bonzini <pbonzini@redhat.com <mailto:pbonzini@redhat.com>> 于2018
> 年11月14日周三 下午11:44写道:
>
> On 14/11/2018 02:38, Li Qiang wrote:
> >
> >
> > Paolo Bonzini <pbonzini@redhat.com <mailto:pbonzini@redhat.com>
> <mailto:pbonzini@redhat.com <mailto:pbonzini@redhat.com>>> 于2018
> > 年11月14日周三 上午2:27写道:
> >
> > On 13/11/2018 11:17, Kevin Wolf wrote:
> > > Am 13.11.2018 um 02:45 hat Li Qiang geschrieben:
> > >> Ping.... what't the status of this patch.
> > >>
> > >> I see Kevin's new pr doesn't contain this patch.
> > >
> > > Oh, I thought you said that you wanted to fix this at a higher
> > level so
> > > that the problem is caught before even getting into nvme
> code? If you
> > > don't, I can apply the patch for my next pull request.
> >
> > As far as I know the bug doesn't exist. Li Qiang, if you have a
> > reproducer please send it.
> >
> >
> > Hello Paolo,
> > Though I've send the debug information and ASAN output in the mail to
> > secalert@redhat.com <mailto:secalert@redhat.com>
> <mailto:secalert@redhat.com <mailto:secalert@redhat.com>>, I'm glad
> provide here.
> > This is for read, I think the write the same but as the PoC is in
> > userspace, the mmap can only map the exact size of the MMIO,
> > So we can only write within the area. But if we using a module we can
> > write the out of MMIO I think
> > The nvme device's parameter should set as 'cmb_size_mb=2' and the PCI
> > address may differ in your system.
>
> Ok, thanks. I've created a reproducer using qtest (though I have to run
> now and cannot post it properly).
>
> The patch for the fix is simply:
>
>
> So do you send this or me?
Me, together with the test.
Paolo
prev parent reply other threads:[~2018-11-15 18:10 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-11-02 1:22 [Qemu-devel] [PATCH] nvme: fix oob access issue(CVE-2018-16847) Li Qiang
2018-11-02 7:51 ` Philippe Mathieu-Daudé
2018-11-02 10:54 ` Kevin Wolf
2018-11-02 15:00 ` Keith Busch
2018-11-02 15:22 ` Li Qiang
2018-11-02 15:42 ` Kevin Wolf
2018-11-05 1:49 ` Li Qiang
2018-11-02 15:40 ` Keith Busch
2018-11-05 1:56 ` Li Qiang
2018-11-13 18:26 ` Paolo Bonzini
2018-11-13 1:45 ` Li Qiang
2018-11-13 10:17 ` Kevin Wolf
2018-11-13 10:24 ` Li Qiang
2018-11-13 18:27 ` Paolo Bonzini
2018-11-14 1:38 ` Li Qiang
2018-11-14 15:44 ` Paolo Bonzini
2018-11-15 3:14 ` Li Qiang
2018-11-15 18:10 ` Paolo Bonzini [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ff40a572-18a1-1609-450f-b1b8e99ed3d5@redhat.com \
--to=pbonzini@redhat.com \
--cc=keith.busch@intel.com \
--cc=kwolf@redhat.com \
--cc=liq3ea@gmail.com \
--cc=mreitz@redhat.com \
--cc=ppandit@redhat.com \
--cc=qemu-block@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).