summaryrefslogtreecommitdiff
path: root/block.c
diff options
context:
space:
mode:
authorKevin Wolf <kwolf@redhat.com>2014-03-26 13:06:02 +0100
committerStefan Hajnoczi <stefanha@redhat.com>2014-04-01 15:22:35 +0200
commit8f4754ede56e3f9ea3fd7207f4a7c4453e59285b (patch)
treeed302e11235c73e0fe503881cf29ace996ddcb26 /block.c
parent1e7226f70c9d944ae7f233b65fb4adda8f910dfe (diff)
downloadqemu-8f4754ede56e3f9ea3fd7207f4a7c4453e59285b.tar.gz
qemu-8f4754ede56e3f9ea3fd7207f4a7c4453e59285b.tar.bz2
qemu-8f4754ede56e3f9ea3fd7207f4a7c4453e59285b.zip
block: Limit request size (CVE-2014-0143)
Limiting the size of a single request to INT_MAX not only fixes a direct integer overflow in bdrv_check_request() (which would only trigger bad behaviour with ridiculously huge images, as in close to 2^64 bytes), but can also prevent overflows in all block drivers. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Diffstat (limited to 'block.c')
-rw-r--r--block.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/block.c b/block.c
index acb70fde3d..7a90a1b25e 100644
--- a/block.c
+++ b/block.c
@@ -2588,6 +2588,10 @@ static int bdrv_check_byte_request(BlockDriverState *bs, int64_t offset,
static int bdrv_check_request(BlockDriverState *bs, int64_t sector_num,
int nb_sectors)
{
+ if (nb_sectors > INT_MAX / BDRV_SECTOR_SIZE) {
+ return -EIO;
+ }
+
return bdrv_check_byte_request(bs, sector_num * BDRV_SECTOR_SIZE,
nb_sectors * BDRV_SECTOR_SIZE);
}