cryptospore / rpms / qemu-kvm

Forked from rpms/qemu-kvm 2 years ago
Clone

Blame SOURCES/kvm-qcow2-Protect-against-some-integer-overflows-in-bdrv.patch

9ae3a8
From 339f13dfd338d88192a11231f4a60bec57b3b66b Mon Sep 17 00:00:00 2001
9ae3a8
From: Kevin Wolf <kwolf@redhat.com>
9ae3a8
Date: Tue, 25 Mar 2014 14:23:38 +0100
9ae3a8
Subject: [PATCH 31/49] qcow2: Protect against some integer overflows in bdrv_check
9ae3a8
9ae3a8
RH-Author: Kevin Wolf <kwolf@redhat.com>
9ae3a8
Message-id: <1395753835-7591-32-git-send-email-kwolf@redhat.com>
9ae3a8
Patchwork-id: n/a
9ae3a8
O-Subject: [virt-devel] [EMBARGOED RHEL-7.0 qemu-kvm PATCH 31/48] qcow2: Protect against some integer overflows in bdrv_check
9ae3a8
Bugzilla: 1066691
9ae3a8
RH-Acked-by: Jeff Cody <jcody@redhat.com>
9ae3a8
RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
9ae3a8
RH-Acked-by: Paolo Bonzini <pbonzini@redhat.com>
9ae3a8
9ae3a8
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1066691
9ae3a8
Upstream status: Series embargoed
9ae3a8
9ae3a8
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
9ae3a8
---
9ae3a8
 block/qcow2-refcount.c |   18 +++++++++---------
9ae3a8
 1 files changed, 9 insertions(+), 9 deletions(-)
9ae3a8
9ae3a8
diff --git a/block/qcow2-refcount.c b/block/qcow2-refcount.c
9ae3a8
index fb57c10..73ae4e3 100644
9ae3a8
--- a/block/qcow2-refcount.c
9ae3a8
+++ b/block/qcow2-refcount.c
9ae3a8
@@ -1018,8 +1018,7 @@ static void inc_refcounts(BlockDriverState *bs,
9ae3a8
                           int64_t offset, int64_t size)
9ae3a8
 {
9ae3a8
     BDRVQcowState *s = bs->opaque;
9ae3a8
-    int64_t start, last, cluster_offset;
9ae3a8
-    int k;
9ae3a8
+    uint64_t start, last, cluster_offset, k;
9ae3a8
 
9ae3a8
     if (size <= 0)
9ae3a8
         return;
9ae3a8
@@ -1029,11 +1028,7 @@ static void inc_refcounts(BlockDriverState *bs,
9ae3a8
     for(cluster_offset = start; cluster_offset <= last;
9ae3a8
         cluster_offset += s->cluster_size) {
9ae3a8
         k = cluster_offset >> s->cluster_bits;
9ae3a8
-        if (k < 0) {
9ae3a8
-            fprintf(stderr, "ERROR: invalid cluster offset=0x%" PRIx64 "\n",
9ae3a8
-                cluster_offset);
9ae3a8
-            res->corruptions++;
9ae3a8
-        } else if (k >= refcount_table_size) {
9ae3a8
+        if (k >= refcount_table_size) {
9ae3a8
             fprintf(stderr, "Warning: cluster offset=0x%" PRIx64 " is after "
9ae3a8
                 "the end of the image file, can't properly check refcounts.\n",
9ae3a8
                 cluster_offset);
9ae3a8
@@ -1474,14 +1469,19 @@ int qcow2_check_refcounts(BlockDriverState *bs, BdrvCheckResult *res,
9ae3a8
                           BdrvCheckMode fix)
9ae3a8
 {
9ae3a8
     BDRVQcowState *s = bs->opaque;
9ae3a8
-    int64_t size, i, highest_cluster;
9ae3a8
-    int nb_clusters, refcount1, refcount2;
9ae3a8
+    int64_t size, i, highest_cluster, nb_clusters;
9ae3a8
+    int refcount1, refcount2;
9ae3a8
     QCowSnapshot *sn;
9ae3a8
     uint16_t *refcount_table;
9ae3a8
     int ret;
9ae3a8
 
9ae3a8
     size = bdrv_getlength(bs->file);
9ae3a8
     nb_clusters = size_to_clusters(s, size);
9ae3a8
+    if (nb_clusters > INT_MAX) {
9ae3a8
+        res->check_errors++;
9ae3a8
+        return -EFBIG;
9ae3a8
+    }
9ae3a8
+
9ae3a8
     refcount_table = g_malloc0(nb_clusters * sizeof(uint16_t));
9ae3a8
 
9ae3a8
     res->bfi.total_clusters =
9ae3a8
-- 
9ae3a8
1.7.1
9ae3a8