qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] softmmu: Support concurrent bounce buffers


From: Michael Tokarev
Subject: Re: [PATCH] softmmu: Support concurrent bounce buffers
Date: Fri, 25 Oct 2024 08:59:34 +0300
User-agent: Mozilla Thunderbird

26.09.2024 11:12, Michael S. Tsirkin wrote:
On Thu, Sep 26, 2024 at 10:58:57AM +0300, Michael Tokarev wrote:
25.09.2024 13:23, Mattias Nissler wrote:
On Wed, Sep 25, 2024 at 12:03 PM Michael Tokarev <mjt@tls.msk.ru> wrote:
..
So, the issue has now become CVE-2024-8612 (information leak), with this
commit (v9.1.0-134-g637b0aa139) being the fix.

Interesting. IIUC, this is triggered by device implementations calling
dma_memory_unmap with an incorrect size parameter as provided by a
hostile guest. Shouldn't the device implementations be fixed to
validate the parameter as well? Maybe this has already happened? It
would seem the more targeted fix to me.

Yes, a similar question occurred to me too, - this change does not look
like a proper fix for CVE-2024-8612.  And nope, no other changes has been
made to fix it properly, in the device implementations.

Maybe now with CVE-2024-8612 in place, we can fix the actual problem in
the right place, instead of relying on this change..
...>> So far I picked this and mac_dbdma change for 9.1, and will try to
back-port things up to 8.2.  But it is better - IMHO - to have a real,
more targetting, fix for CVE-2024-8612.

Agree 100% here.

Cc a bunch more people involved.

a little ping?

Thanks,

/mjt



reply via email to

[Prev in Thread] Current Thread [Next in Thread]