NFC: microread: Potential overflows in microread_target_discovered()
authorDan Carpenter <dan.carpenter@oracle.com>
Mon, 1 Sep 2014 17:27:29 +0000 (20:27 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 5 Oct 2014 21:52:18 +0000 (14:52 -0700)
commit621f496ffae1da0095a4f7b0338821bb25225323
tree02aab709dd39d9bbc25b67f76161416d9352e518
parentf3c8aba3bc795c2241aeaf3d1e92ab4d5a6c0682
NFC: microread: Potential overflows in microread_target_discovered()

commit d07f1e8600ccb885c8f4143402b8912f7d827bcb upstream.

Smatch says that skb->data is untrusted so we need to check to make sure
that the memcpy() doesn't overflow.

Fixes: cfad1ba87150 ('NFC: Initial support for Inside Secure microread')
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/nfc/microread/microread.c