]> git.ipfire.org Git - thirdparty/qemu.git/commit
qcow1: Validate image size (CVE-2014-0223)
authorKevin Wolf <kwolf@redhat.com>
Thu, 8 May 2014 11:08:20 +0000 (13:08 +0200)
committerMichael Roth <mdroth@linux.vnet.ibm.com>
Thu, 3 Jul 2014 21:31:28 +0000 (16:31 -0500)
commitb53d8665a2665978d7f7da47d2fca13e9481b067
tree718d6ab1ec9fe0c62ae69a4fb8232462fc211a4f
parent8b17eb6e6cdd4d5b4f3291c7e8afff83960f00d7
qcow1: Validate image size (CVE-2014-0223)

A huge image size could cause s->l1_size to overflow. Make sure that
images never require a L1 table larger than what fits in s->l1_size.

This cannot only cause unbounded allocations, but also the allocation of
a too small L1 table, resulting in out-of-bounds array accesses (both
reads and writes).

Cc: qemu-stable@nongnu.org
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
(cherry picked from commit 46485de0cb357b57373e1ca895adedf1f3ed46ec)
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
block/qcow.c
tests/qemu-iotests/092
tests/qemu-iotests/092.out