Skip to content
  • Tobias Stoeckmann's avatar
    Avoid integer overflows during memory allocation. · a0587d43
    Tobias Stoeckmann authored and Milan Broz's avatar Milan Broz committed
    It is possible to overflow integers during memory allocation with
    insanely large "key bytes" specified in a LUKS header.
    
    Although it could be argued to properly validate LUKS headers while
    parsing them, it's still a good idea to fix any form of possible
    overflow attacks against cryptsetup in these allocation functions.
    a0587d43