Followup to "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" #cip
First, thanks for reaching us over email.
I noticed that the mentioned patch (https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git/commit/?h=linux-4.4.y-st&id=b2df16de20b3f2ee6dbaf86b474e1bd87ddd8d51) made it into various CIP branches, e.g. linux-4.4.y-st.Yup, those issues seem to be real. We'd preffer not to take fixes that
are not upstream, and this is not too severe bug. (Should the skb be
freed in the error paths, too?)
I have sent an email, and it seems fixes are pending.
PS: I'm cc-ing you, in case you are not subscribed to the list.
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany