qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: cve patch wanted


From: Michael Roth
Subject: Re: cve patch wanted
Date: Mon, 13 Jul 2020 17:40:27 -0500
User-agent: alot/0.7

Quoting Philippe Mathieu-Daudé (2020-07-13 03:16:37)
> Hi,
> 
> On 7/11/20 2:28 PM, 林奕帆 wrote:
> > Hello
> >    I am a student from Fudan University in China. I am doing research on
> > CVE patch recently. But i can not find the PATCH COMMIT of
> > CVE-2019-12247 cve-2019-12155 cve-2019-6778.Can you give me the commit
> > fix this cve?
> 
> * CVE-2019-12247
> 
> I don't know about this one, maybe related to CVE-2018-12617 fixed
> by commit 1329651fb4 ("qga: Restrict guest-file-read count to 48 MB")
> Cc'ing Michael for CVE-2019-12247.

For CVE-2019-12247 is was determined the existing limits for input to
QEMU's QMP parser make it non-exploitable:

  https://bugzilla.redhat.com/show_bug.cgi?id=1712834

A patch to enforce/document some set limits rather than relying on
parser error messages (like what was done with 1329651fb4 for CVE-2018-12617)
might be nice, but it doesn't appear to be a security risk.

> 
> * CVE-2019-12155
> 
> I don't have access to the information (still marked 'private'
> one year after), but I *guess* it has been fixed by commit
> d52680fc93 ("qxl: check release info object").
> Cc'ing Gerd and Prasad.
> 
> * CVE-2019-6778
> 
> This one is in SLiRP, Cc'ing Samuel and Marc-André.
> 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]