diff options
author | Julian Andres Klode <julian.klode@canonical.com> | 2020-12-05 19:55:30 +0100 |
---|---|---|
committer | Julian Andres Klode <julian.klode@canonical.com> | 2020-12-09 17:30:43 +0100 |
commit | df81895bce764dd02fbb4d67b92d28a730b5281f (patch) | |
tree | 2b85bacae381c674077235d5dfde96e9cf55a1ed /test/integration/test-ubuntu-bug-1078697-missing-source-hashes | |
parent | 0444f9dd52c2bc7bec315f6f1ecad76a30713fa0 (diff) |
CVE-2020-27350: tarfile: integer overflow: Limit tar items to 128 GiB
The integer overflow was detected by DonKult who added a check like this:
(std::numeric_limits<decltype(Itm.Size)>::max() - (2 * sizeof(Block)))
Which deals with the code as is, but also still is a fairly big limit,
and could become fragile if we change the code. Let's limit our file
sizes to 128 GiB, which should be sufficient for everyone.
Original comment by DonKult:
The code assumes that it can add sizeof(Block)-1 to the size of the item
later on, but if we are close to a 64bit overflow this is not possible.
Fixing this seems too complex compared to just ensuring there is enough
room left given that we will have a lot more problems the moment we will
be acting on files that large as if the item is that large, the (valid)
tar including it probably doesn't fit in 64bit either.
Diffstat (limited to 'test/integration/test-ubuntu-bug-1078697-missing-source-hashes')
0 files changed, 0 insertions, 0 deletions