From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:56226 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1031916AbbKFFy0 (ORCPT ); Fri, 6 Nov 2015 00:54:26 -0500 Subject: Patch "iio: accel: sca3000: memory corruption in sca3000_read_first_n_hw_rb()" has been added to the 4.2-stable tree To: dan.carpenter@oracle.com, gregkh@linuxfoundation.org, jic23@kernel.org Cc: , From: Date: Thu, 05 Nov 2015 21:54:15 -0800 Message-ID: <144678925510131@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ANSI_X3.4-1968 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org List-ID: This is a note to let you know that I've just added the patch titled iio: accel: sca3000: memory corruption in sca3000_read_first_n_hw_rb() to the 4.2-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: iio-accel-sca3000-memory-corruption-in-sca3000_read_first_n_hw_rb.patch and it can be found in the queue-4.2 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let know about it. >>From eda7d0f38aaf50dbb2a2de15e8db386c4f6f65fc Mon Sep 17 00:00:00 2001 From: Dan Carpenter Date: Sat, 8 Aug 2015 22:16:42 +0300 Subject: iio: accel: sca3000: memory corruption in sca3000_read_first_n_hw_rb() From: Dan Carpenter commit eda7d0f38aaf50dbb2a2de15e8db386c4f6f65fc upstream. "num_read" is in byte units but we are write u16s so we end up write twice as much as intended. Signed-off-by: Dan Carpenter Signed-off-by: Jonathan Cameron Signed-off-by: Greg Kroah-Hartman --- drivers/staging/iio/accel/sca3000_ring.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/staging/iio/accel/sca3000_ring.c +++ b/drivers/staging/iio/accel/sca3000_ring.c @@ -116,7 +116,7 @@ static int sca3000_read_first_n_hw_rb(st if (ret) goto error_ret; - for (i = 0; i < num_read; i++) + for (i = 0; i < num_read / sizeof(u16); i++) *(((u16 *)rx) + i) = be16_to_cpup((__be16 *)rx + i); if (copy_to_user(buf, rx, num_read)) Patches currently in stable-queue which might be from dan.carpenter@oracle.com are queue-4.2/iio-accel-sca3000-memory-corruption-in-sca3000_read_first_n_hw_rb.patch queue-4.2/drm-crtc-integer-overflow-in-drm_property_create_blob.patch