|
From: | Max Reitz |
Subject: | Re: [Qemu-devel] [PATCH for-2.0 40/47] block: Limit request size (CVE-2014-0143) |
Date: | Sat, 29 Mar 2014 00:24:00 +0100 |
User-agent: | Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0 |
On 26.03.2014 13:06, Stefan Hajnoczi wrote:
From: Kevin Wolf <address@hidden> Limiting the size of a single request to INT_MAX not only fixes a direct integer overflow in bdrv_check_request() (which would only trigger bad behaviour with ridiculously huge images, as in close to 2^64 bytes), but can also prevent overflows in all block drivers. Signed-off-by: Kevin Wolf <address@hidden> --- block.c | 4 ++++ 1 file changed, 4 insertions(+)
Reviewed-by: Max Reitz <address@hidden>
[Prev in Thread] | Current Thread | [Next in Thread] |