]> www.infradead.org Git - users/dwmw2/linux.git/commit
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
authorJordy Zomer <jordy@pwning.systems>
Tue, 11 Jan 2022 16:44:51 +0000 (17:44 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 28 Mar 2022 07:57:07 +0000 (09:57 +0200)
commit25c23fe40e6e1ef8e6d503c52b4f518b2e520ab7
tree1fe6c03e5336f7516a3d511e0d7c0990b4671f40
parent9940314ebfc61cb7bc7fca4a0deed2f27fdefd11
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION

commit 4fbcc1a4cb20fe26ad0225679c536c80f1648221 upstream.

It appears that there are some buffer overflows in EVT_TRANSACTION.
This happens because the length parameters that are passed to memcpy
come directly from skb->data and are not guarded in any way.

Signed-off-by: Jordy Zomer <jordy@pwning.systems>
Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@canonical.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Denis Efremov <denis.e.efremov@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/nfc/st21nfca/se.c