Re: [PATCH] nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 21, 2022 at 08:40:06PM +0300, Denis Efremov wrote:
> From: Jordy Zomer <jordy@pwning.systems>
> 
> It appears that there are some buffer overflows in EVT_TRANSACTION.
> This happens because the length parameters that are passed to memcpy
> come directly from skb->data and are not guarded in any way.
> 
> Link: https://lore.kernel.org/all/20220111164451.3232987-1-jordy@pwning.systems/#t
> Fixes: 26fc6c7f02cb ("NFC: st21nfca: Add HCI transaction event support")
> Cc: stable@xxxxxxxxxxxxxxx # 4.0+
> Signed-off-by: Jordy Zomer <jordy@pwning.systems>
> Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxxxxx>
> Signed-off-by: David S. Miller <davem@xxxxxxxxxxxxx>
> Signed-off-by: Denis Efremov <denis.e.efremov@xxxxxxxxxx>
> ---
> CVE-2022-26490 was assigned to this patch. It looks like it's not in
> the stable trees yet. I only added Link:/Fixes:/Cc: stable... to the
> commit's message.
> 
>  drivers/nfc/st21nfca/se.c | 10 ++++++++++
>  1 file changed, 10 insertions(+)

What is the git commit id of this patch in Linus's tree?

And your "To:" line was corrupted, might want to check your email client :(

thanks,

greg k-h



[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux