Received: by 10.192.165.148 with SMTP id m20csp3198804imm; Mon, 23 Apr 2018 02:18:01 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+L6WF2yuUd7egwWyzb10RysTKXQAXvPxfBWXYeZ5Jt8m0B0ujx3kka7JiuzCfGdyWbqHnD X-Received: by 10.98.13.71 with SMTP id v68mr19183597pfi.69.1524475080879; Mon, 23 Apr 2018 02:18:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524475080; cv=none; d=google.com; s=arc-20160816; b=tzvPqOntAHwIusLflZ1Pc/+kyh/dzbsjvedc0u/Fh2AP76VDCP0nQn7541EG585neS ZMU5cDi3aw0YzTie6HHtOQJKdU2dJYEM/ODl4bnUCbJ/o8xS8p3WdJ4vLNJiQ56/HuI/ T0/ly7ucVKRdfzjqSB4Yc+k7Enp1CuRFPo4cbL8+jkgDOv4R6QBBWqUtPyq414mvjj2h ioP7O5wlHy3JW1zQSD9I/JFgZfxwlxb9L5dH5IrC/3zZyhs5acQ2N1xQm6J8fO5+JFT5 4Xn55BkDL4xsh76oxZ/mxYkIDmO3HiGN1+9lkdaHa/JOSKJjoM8QMFBYkgc6SsM+Cq+e 5bVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=nFUJlQyfpNfnkKL+JLfyzpCOrz79s27sODnfhE7pqws=; b=Zmt47lyina6/tPiZGGXZxHwxPxZrd1e+o74qm/ww1mBHaMjicqjMgKBt9GRB6SyuDB 6M89HqSa5ubTLWaXjfqKU2Mg0p8vFD4f7NBO0rZcxf/pJcq6O7mLQ+MlnXsyEmu02rah HfvVkQCbruTG2q30MevVNBhzJh6+acmWdyZ9RV1E6xvbAmwmCxiEFsJjepDzGfONeldC quQEdI6uXJGGCexvSSIVcmabYwjuoD6ht0GnQ+Zw8sbKAy0oMk2BER9eXfF2VUaUr43Y nc5UcHwwkteU6ojTqQpwJoaM8aOINbMnGaDbweSGyPhF+GZ0Tb9UIWyHPGQpDFZzHkxv yOQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b14-v6si11201587pll.116.2018.04.23.02.17.46; Mon, 23 Apr 2018 02:18:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754269AbeDWJQm (ORCPT + 99 others); Mon, 23 Apr 2018 05:16:42 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:60558 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753109AbeDWJQi (ORCPT ); Mon, 23 Apr 2018 05:16:38 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 48A21D4C; Mon, 23 Apr 2018 09:16:37 +0000 (UTC) Date: Mon, 23 Apr 2018 11:16:31 +0200 From: Greg KH To: Amit Pundir Cc: lkml , linux-wireless@vger.kernel.org, Samuel Ortiz , Christophe Ricard , Andy Shevchenko , John Stultz , Dmitry Shmidt , Todd Kjos , Android Kernel Team , Suren Baghdasaryan Subject: Re: [RESEND][PATCH 4/4] NFC: fdp: Fix possible buffer overflow in WCS4000 NFC driver Message-ID: <20180423091631.GA14322@kroah.com> References: <1524045904-7005-1-git-send-email-amit.pundir@linaro.org> <1524045904-7005-5-git-send-email-amit.pundir@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1524045904-7005-5-git-send-email-amit.pundir@linaro.org> User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 18, 2018 at 03:35:04PM +0530, Amit Pundir wrote: > From: Suren Baghdasaryan > > Possible buffer overflow when reading next_read_size bytes into > tmp buffer after next_read_size was extracted from a previous packet. > > Signed-off-by: Suren Baghdasaryan > Signed-off-by: Amit Pundir > --- > drivers/nfc/fdp/i2c.c | 10 ++++++++++ > 1 file changed, 10 insertions(+) > > diff --git a/drivers/nfc/fdp/i2c.c b/drivers/nfc/fdp/i2c.c > index c4da50e07bbc..08a4f82a2965 100644 > --- a/drivers/nfc/fdp/i2c.c > +++ b/drivers/nfc/fdp/i2c.c > @@ -176,6 +176,16 @@ static int fdp_nci_i2c_read(struct fdp_i2c_phy *phy, struct sk_buff **skb) > /* Packet that contains a length */ > if (tmp[0] == 0 && tmp[1] == 0) { > phy->next_read_size = (tmp[2] << 8) + tmp[3] + 3; > + /* > + * Ensure next_read_size does not exceed sizeof(tmp) > + * for reading that many bytes during next iteration > + */ > + if (phy->next_read_size > FDP_NCI_I2C_MAX_PAYLOAD) { > + dev_dbg(&client->dev, "%s: corrupted packet\n", > + __func__); As Andy points out, no need for __func__ in any dev_dbg() call. thanks, greg k-h