commit | ff7510205896efaf9c5f58d656b2ce2e2b5c1135 | [log] [tgz] |
---|---|---|
author | Dan Carpenter <dan.carpenter@oracle.com> | Mon Sep 01 20:27:29 2014 +0300 |
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | Sun Oct 05 14:54:12 2014 -0700 |
tree | 8f5d434c18061a481dc0690011d860ed09da271e | |
parent | b04cb59bad40aa369a87c000dbb9e45cd2f70354 [diff] |
NFC: microread: Potential overflows in microread_target_discovered() commit d07f1e8600ccb885c8f4143402b8912f7d827bcb upstream. Smatch says that skb->data is untrusted so we need to check to make sure that the memcpy() doesn't overflow. Fixes: cfad1ba87150 ('NFC: Initial support for Inside Secure microread') Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Signed-off-by: Samuel Ortiz <sameo@linux.intel.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>