diff options
author | Sasha Levin <sasha.levin@oracle.com> | 2014-12-03 19:22:48 -0500 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2015-01-29 17:40:56 -0800 |
commit | 7336dcc2139a09928c3aa04216576d94bcc857d9 (patch) | |
tree | 52fa593022ce0076c9f32c7da4302f320446cafa /kernel | |
parent | 5b39b457f9d9fda92ddbebf92d1bb94213ae1c5a (diff) | |
download | linux-stable-7336dcc2139a09928c3aa04216576d94bcc857d9.tar.gz linux-stable-7336dcc2139a09928c3aa04216576d94bcc857d9.tar.bz2 linux-stable-7336dcc2139a09928c3aa04216576d94bcc857d9.zip |
time: settimeofday: Validate the values of tv from user
commit 6ada1fc0e1c4775de0e043e1bd3ae9d065491aa5 upstream.
An unvalidated user input is multiplied by a constant, which can result in
an undefined behaviour for large values. While this is validated later,
we should avoid triggering undefined behaviour.
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
[jstultz: include trivial milisecond->microsecond correction noticed
by Andy]
Signed-off-by: John Stultz <john.stultz@linaro.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/time.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/kernel/time.c b/kernel/time.c index d21398e6da87..31ec845d0e80 100644 --- a/kernel/time.c +++ b/kernel/time.c @@ -195,6 +195,10 @@ SYSCALL_DEFINE2(settimeofday, struct timeval __user *, tv, if (tv) { if (copy_from_user(&user_tv, tv, sizeof(*tv))) return -EFAULT; + + if (!timeval_valid(&user_tv)) + return -EINVAL; + new_ts.tv_sec = user_tv.tv_sec; new_ts.tv_nsec = user_tv.tv_usec * NSEC_PER_USEC; } |