commit | 4fbcc1a4cb20fe26ad0225679c536c80f1648221 | [log] [tgz] |
---|---|---|
author | Jordy Zomer <jordy@pwning.systems> | Tue Jan 11 17:44:51 2022 +0100 |
committer | David S. Miller <davem@davemloft.net> | Wed Jan 12 14:17:45 2022 +0000 |
tree | 229ddb89541415682459fce4f0934257016984d2 | |
parent | 2a4d75bfe41232608f5596a6d1369f92ccb20817 [diff] |
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION It appears that there are some buffer overflows in EVT_TRANSACTION. This happens because the length parameters that are passed to memcpy come directly from skb->data and are not guarded in any way. Signed-off-by: Jordy Zomer <jordy@pwning.systems> Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@canonical.com> Signed-off-by: David S. Miller <davem@davemloft.net>