From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dan Carpenter Date: Tue, 02 Sep 2014 08:54:36 +0000 Subject: Re: [patch -RESEND] NFC: potential overflows in microread_target_discovered() Message-Id: <20140902085436.GE6549@mwanda> List-Id: References: <20140901172729.GA6549@mwanda> In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: Frans Klaver Cc: Lauro Ramos Venancio , Eric Lapuyade , Aloisio Almeida Jr , Samuel Ortiz , "John W. Linville" , Jeff Kirsher , linux-wireless@vger.kernel.org, linux-nfc@ml01.01.org, kernel-janitors@vger.kernel.org, Kees Cook On Tue, Sep 02, 2014 at 09:02:36AM +0200, Frans Klaver wrote: > > diff --git a/drivers/nfc/microread/microread.c b/drivers/nfc/microread/microread.c > > index f868333271aa..963a4a5dc88e 100644 > > --- a/drivers/nfc/microread/microread.c > > +++ b/drivers/nfc/microread/microread.c > > @@ -501,9 +501,13 @@ static void microread_target_discovered(struct nfc_hci_dev *hdev, u8 gate, > > targets->sens_res > > be16_to_cpu(*(u16 *)&skb->data[MICROREAD_EMCF_A_ATQA]); > > targets->sel_res = skb->data[MICROREAD_EMCF_A_SAK]; > > - memcpy(targets->nfcid1, &skb->data[MICROREAD_EMCF_A_UID], > > - skb->data[MICROREAD_EMCF_A_LEN]); > > targets->nfcid1_len = skb->data[MICROREAD_EMCF_A_LEN]; > > + if (targets->nfcid1_len > sizeof(targets->nfcid1)) { > > You should probably compare against sizeof(*targets->nfcid1). > No. It's an array not a pointer. You should make a small test program to test your ideas. int main(void) { char buf[10]; printf("%d %d\n", sizeof(buf), sizeof(*buf)); return 0; } regards, dan carpenter