NFC: microread: Potential overflows in microread_target_discovered()
authorDan Carpenter <dan.carpenter@oracle.com>
Mon, 1 Sep 2014 17:27:29 +0000 (20:27 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 5 Oct 2014 21:54:12 +0000 (14:54 -0700)
commitff7510205896efaf9c5f58d656b2ce2e2b5c1135
tree8f5d434c18061a481dc0690011d860ed09da271e
parentb04cb59bad40aa369a87c000dbb9e45cd2f70354
NFC: microread: Potential overflows in microread_target_discovered()

commit d07f1e8600ccb885c8f4143402b8912f7d827bcb upstream.

Smatch says that skb->data is untrusted so we need to check to make sure
that the memcpy() doesn't overflow.

Fixes: cfad1ba87150 ('NFC: Initial support for Inside Secure microread')
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/nfc/microread/microread.c