qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 0/3] Tighten qemu-img rules on missing backing format


From: Eric Blake
Subject: Re: [PATCH 0/3] Tighten qemu-img rules on missing backing format
Date: Mon, 24 Feb 2020 10:14:22 -0600
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1

On 2/24/20 5:01 AM, Peter Krempa wrote:
On Sat, Feb 22, 2020 at 05:23:38 -0600, Eric Blake wrote:
In the past, we have had CVEs caused by qemu probing one image type
when an image started out as another but the guest was able to modify
content.  The solution to those CVEs was to encode backing format
information into qcow2, to ensure that once we make a decision, we
don't have to probe any further.  However, we failed to enforce this
at the time.  And now that libvirt is switching to -blockdev, it has
come back to bite us: with -block, libvirt had no easy way (other than

s/-block/-drive/ ?

Whoops, yes.


json:{} pseudoprotocol) to force a backing file, but with -blockdev,

"json:{}" is basically -blockdev with extra steps. Old -drive usage
didn't have any way to do that apart from rewriting the image. Which is
basically the same since json:{} also needs to be recorded in the image
to take effect.

Discussed in my other reply (it looks like I'll need to distinguish between json: pointing to just a protocol as the backing layer, vs. the more typical json: pointing to a format as the backing layer).


libvirt HAS to use blockdev-open on the backing chain and supply a
backing format there, and thus has to probe images.  If libvirt ever
probes differently than qemu, we are back to the potential
guest-visible data corruption or potential host CVEs.

As I've elaborated in [1] I disagree with the host CVE part. The
insecure part is not probing the format itself, but probing format AND
using the backing file of the image if we probed format.

I agree that mis-probing format leads to data corruption though.

Your argument that there are other means at hand to prevent CVE when probing does occur is valid, however, my point is that CVEs due to probing were historically possible if the rest of the toolchain is not careful. It is more of a burden-shifting problem: when qemu is not preventing probing, then other applications like libvirt have to take on extra measures to ensure libvirt does not have a CVE (the fact that we haven't had any in a few years is a good sign that we are at least aware of the problem and have worked hard to remain safe, even if it has required duplicated effort across multiple tools); whereas if qemu takes a hard-line stance on probing (which is the goal of the deprecation introduced in this series), now qemu has ensured safety whether or not the other layers also take measures to avoid any CVE.


It's time to deprecate images without backing formats.  This patch
series does two things: 1. record an implicit backing format where one
is learned (although sadly, not all qemu-img commands are able to
learn a format), 2. warn to the user any time a probe had ambiguous
results or a backing format is omitted from an image.  All previous
images without a backing format are still usable, but hopefully the
warnings (along with libvirt's complaints about images without a
backing format) help us pinpoint remaining applications that are

It is not a warning in libvirt though. We just refuse it now because we
don't do probing. Previously we allowed qemu to probe the format and the
only thing that prevented host CVEs was if the host used selinux or any
other security approach which would prevent opening the backing file.

creating images on their own without recording a backing format.

--
Eric Blake, Principal Software Engineer
Red Hat, Inc.           +1-919-301-3226
Virtualization:  qemu.org | libvirt.org




reply via email to

[Prev in Thread] Current Thread [Next in Thread]