Followup to "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" #cip
theflamefire89@...
Hi all,
|
|
Pavel Machek
Hi!
First, thanks for reaching us over email. I noticed that the mentioned patch (https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git/commit/?h=linux-4.4.y-st&id=b2df16de20b3f2ee6dbaf86b474e1bd87ddd8d51) made it into various CIP branches, e.g. linux-4.4.y-st.Yup, those issues seem to be real. We'd preffer not to take fixes that are not upstream, and this is not too severe bug. (Should the skb be freed in the error paths, too?) I have sent an email, and it seems fixes are pending. Best regards, Pavel PS: I'm cc-ing you, in case you are not subscribed to the list. -- DENX Software Engineering GmbH, Managing Director: Wolfgang Denk HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
|
|