From mboxrd@z Thu Jan 1 00:00:00 1970 From: Samuel Ortiz Date: Thu, 04 Sep 2014 23:03:12 +0000 Subject: Re: [patch -RESEND] NFC: potential overflows in microread_target_discovered() Message-Id: <20140904230312.GA6702@zurbaran> List-Id: References: <20140901172729.GA6549@mwanda> In-Reply-To: <20140901172729.GA6549@mwanda> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: Dan Carpenter Cc: Lauro Ramos Venancio , Eric Lapuyade , Aloisio Almeida Jr , "John W. Linville" , Jeff Kirsher , linux-wireless@vger.kernel.org, linux-nfc@ml01.01.org, kernel-janitors@vger.kernel.org, Kees Cook Hi Dan, On Mon, Sep 01, 2014 at 08:27:29PM +0300, Dan Carpenter wrote: > Smatch says that skb->data is untrusted so we need to check to make sure > that the memcpy() doesn't overflow. Applied to nfc-fixes, thanks. Cheers, Samuel. -- Intel Open Source Technology Centre http://oss.intel.com/