f3a92caa76
CVE-2014-0150: virtio-net: buffer overflow in virtio_net_handle_mac() function (bz #1086775, bz #1078846) CVE-2013-4544: vmxnet3: bounds checking buffer overrun (bz #1087513, bz #1087522) CVE-2014-2894: out of bounds buffer accesses, guest triggerable via IDE SMART (bz #1087981, bz #1087971)
34 lines
1.2 KiB
Diff
34 lines
1.2 KiB
Diff
From 176e7263b7b5bffba72675f3821a21904e9e4ab1 Mon Sep 17 00:00:00 2001
|
|
From: Kevin Wolf <kwolf@redhat.com>
|
|
Date: Wed, 26 Mar 2014 13:06:02 +0100
|
|
Subject: [PATCH] block: Limit request size (CVE-2014-0143)
|
|
|
|
Limiting the size of a single request to INT_MAX not only fixes a
|
|
direct integer overflow in bdrv_check_request() (which would only
|
|
trigger bad behaviour with ridiculously huge images, as in close to
|
|
2^64 bytes), but can also prevent overflows in all block drivers.
|
|
|
|
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
|
|
Reviewed-by: Max Reitz <mreitz@redhat.com>
|
|
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
|
|
(cherry picked from commit 8f4754ede56e3f9ea3fd7207f4a7c4453e59285b)
|
|
---
|
|
block.c | 4 ++++
|
|
1 file changed, 4 insertions(+)
|
|
|
|
diff --git a/block.c b/block.c
|
|
index 8ce8b91..6c48469 100644
|
|
--- a/block.c
|
|
+++ b/block.c
|
|
@@ -2160,6 +2160,10 @@ static int bdrv_check_byte_request(BlockDriverState *bs, int64_t offset,
|
|
static int bdrv_check_request(BlockDriverState *bs, int64_t sector_num,
|
|
int nb_sectors)
|
|
{
|
|
+ if (nb_sectors > INT_MAX / BDRV_SECTOR_SIZE) {
|
|
+ return -EIO;
|
|
+ }
|
|
+
|
|
return bdrv_check_byte_request(bs, sector_num * BDRV_SECTOR_SIZE,
|
|
nb_sectors * BDRV_SECTOR_SIZE);
|
|
}
|