]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
authorJordy Zomer <jordy@pwning.systems>
Tue, 11 Jan 2022 16:44:51 +0000 (17:44 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 28 Mar 2022 06:41:42 +0000 (08:41 +0200)
commit0043b74987acb44f1ade537aad901695511cfebe
treed2e3bb47dd52a040991a01221a488d711fffe758
parent67aefbfee14b1f29cb4529911aef7322899ecc8b
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION

commit 4fbcc1a4cb20fe26ad0225679c536c80f1648221 upstream.

It appears that there are some buffer overflows in EVT_TRANSACTION.
This happens because the length parameters that are passed to memcpy
come directly from skb->data and are not guarded in any way.

Signed-off-by: Jordy Zomer <jordy@pwning.systems>
Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@canonical.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Denis Efremov <denis.e.efremov@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/nfc/st21nfca/se.c