diff options
author | Kevin Wolf <kwolf@redhat.com> | 2014-05-08 13:08:20 +0200 |
---|---|---|
committer | Kevin Wolf <kwolf@redhat.com> | 2014-05-19 11:36:49 +0200 |
commit | 46485de0cb357b57373e1ca895adedf1f3ed46ec (patch) | |
tree | 3d7bdb3799feee94728a37374a26349d46e7b227 /tests/qemu-iotests/092.out | |
parent | 42eb58179b3b215bb507da3262b682b8a2ec10b5 (diff) |
qcow1: Validate image size (CVE-2014-0223)
A huge image size could cause s->l1_size to overflow. Make sure that
images never require a L1 table larger than what fits in s->l1_size.
This cannot only cause unbounded allocations, but also the allocation of
a too small L1 table, resulting in out-of-bounds array accesses (both
reads and writes).
Cc: qemu-stable@nongnu.org
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Diffstat (limited to 'tests/qemu-iotests/092.out')
-rw-r--r-- | tests/qemu-iotests/092.out | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/tests/qemu-iotests/092.out b/tests/qemu-iotests/092.out index 73918b3c50..ac03302d86 100644 --- a/tests/qemu-iotests/092.out +++ b/tests/qemu-iotests/092.out @@ -21,4 +21,11 @@ qemu-io: can't open device TEST_DIR/t.qcow: L2 table size must be between 512 an no file open, try 'help open' qemu-io: can't open device TEST_DIR/t.qcow: L2 table size must be between 512 and 64k no file open, try 'help open' + +== Invalid size == +Formatting 'TEST_DIR/t.IMGFMT', fmt=IMGFMT size=67108864 +qemu-io: can't open device TEST_DIR/t.qcow: Image too large +no file open, try 'help open' +qemu-io: can't open device TEST_DIR/t.qcow: Image too large +no file open, try 'help open' *** done |