]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
ofono: fix CVE-2024-7539
authorYogita Urade <yogita.urade@windriver.com>
Tue, 14 Jan 2025 08:03:17 +0000 (08:03 +0000)
committerSteve Sakoman <steve@sakoman.com>
Tue, 14 Jan 2025 13:49:41 +0000 (05:49 -0800)
commitb1626a0df6911172adafa85a99d36486eb7e2c62
tree2f3a36114ceb60d90af7a0cef0e430d5eb51c3c8
parent09f0b16877ab207cba91f13d036bc6f4cd6bdf70
ofono: fix CVE-2024-7539

oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability.
This vulnerability allows local attackers to execute arbitrary code
on affected installations of oFono. An attacker must first obtain
the ability to execute code on the target modem in order to exploit
this vulnerability.

The specific flaw exists within the parsing of responses from AT+CUSD
commands. The issue results from the lack of proper validation of the
length of user-supplied data prior to copying it to a stack-based buffer.
An attacker can leverage this vulnerability to execute code in the
context of root. Was ZDI-CAN-23195.

Reference:
https://security-tracker.debian.org/tracker/CVE-2024-7539

Upstream Patch:
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=389e2344f86319265fb72ae590b470716e038fdc

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/ofono/ofono/CVE-2024-7539.patch [new file with mode: 0644]
meta/recipes-connectivity/ofono/ofono_1.34.bb