diff options
author | Kevin Wolf <kwolf@redhat.com> | 2014-03-26 13:06:02 +0100 |
---|---|---|
committer | Stefan Hajnoczi <stefanha@redhat.com> | 2014-04-01 15:22:35 +0200 |
commit | 8f4754ede56e3f9ea3fd7207f4a7c4453e59285b (patch) | |
tree | ed302e11235c73e0fe503881cf29ace996ddcb26 /module-common.c | |
parent | 1e7226f70c9d944ae7f233b65fb4adda8f910dfe (diff) | |
download | qemu-8f4754ede56e3f9ea3fd7207f4a7c4453e59285b.tar.gz qemu-8f4754ede56e3f9ea3fd7207f4a7c4453e59285b.tar.bz2 qemu-8f4754ede56e3f9ea3fd7207f4a7c4453e59285b.zip |
block: Limit request size (CVE-2014-0143)
Limiting the size of a single request to INT_MAX not only fixes a
direct integer overflow in bdrv_check_request() (which would only
trigger bad behaviour with ridiculously huge images, as in close to
2^64 bytes), but can also prevent overflows in all block drivers.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Diffstat (limited to 'module-common.c')
0 files changed, 0 insertions, 0 deletions