mirror of https://github.com/xemu-project/xemu.git
luks: Catch integer overflow for huge sizes
When you request an image size close to UINT64_MAX, the addition of the crypto header may cause an integer overflow. Catch it instead of silently truncating the image size. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
This commit is contained in:
parent
e39e959e89
commit
3d7ed9c453
|
@ -102,6 +102,11 @@ static ssize_t block_crypto_init_func(QCryptoBlock *block,
|
||||||
{
|
{
|
||||||
struct BlockCryptoCreateData *data = opaque;
|
struct BlockCryptoCreateData *data = opaque;
|
||||||
|
|
||||||
|
if (data->size > INT64_MAX || headerlen > INT64_MAX - data->size) {
|
||||||
|
error_setg(errp, "The requested file size is too large");
|
||||||
|
return -EFBIG;
|
||||||
|
}
|
||||||
|
|
||||||
/* User provided size should reflect amount of space made
|
/* User provided size should reflect amount of space made
|
||||||
* available to the guest, so we must take account of that
|
* available to the guest, so we must take account of that
|
||||||
* which will be used by the crypto header
|
* which will be used by the crypto header
|
||||||
|
|
Loading…
Reference in New Issue