]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commitdiff
ofono: patch CVE-2023-4235
authorPeter Marko <peter.marko@siemens.com>
Sun, 19 Jan 2025 16:37:32 +0000 (17:37 +0100)
committerSteve Sakoman <steve@sakoman.com>
Tue, 21 Jan 2025 20:33:25 +0000 (12:33 -0800)
Cherry-pick commit
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=02aa0f9bad3d9e47a152fc045d0f51874d901d7e

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/ofono/ofono/CVE-2023-4235.patch [new file with mode: 0644]
meta/recipes-connectivity/ofono/ofono_2.4.bb

diff --git a/meta/recipes-connectivity/ofono/ofono/CVE-2023-4235.patch b/meta/recipes-connectivity/ofono/ofono/CVE-2023-4235.patch
new file mode 100644 (file)
index 0000000..059f9bb
--- /dev/null
@@ -0,0 +1,38 @@
+From 02aa0f9bad3d9e47a152fc045d0f51874d901d7e Mon Sep 17 00:00:00 2001
+From: "Sicelo A. Mhlongo" <absicsz@gmail.com>
+Date: Wed, 4 Dec 2024 10:18:51 +0200
+Subject: [PATCH] smsutil: check deliver reports fit in buffer
+
+Fixes CVE-2023-4235
+
+CVE: CVE-2023-4235
+Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=02aa0f9bad3d9e47a152fc045d0f51874d901d7e]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ src/smsutil.c | 6 ++++++
+ 1 file changed, 6 insertions(+)
+
+diff --git a/src/smsutil.c b/src/smsutil.c
+index 484bfd0b..ac89f16c 100644
+--- a/src/smsutil.c
++++ b/src/smsutil.c
+@@ -1240,10 +1240,16 @@ static gboolean decode_deliver_report(const unsigned char *pdu, int len,
+                       return FALSE;
+               if (out->type == SMS_TYPE_DELIVER_REPORT_ERROR) {
++                      if (expected > (int) sizeof(out->deliver_err_report.ud))
++                              return FALSE;
++
+                       out->deliver_err_report.udl = udl;
+                       memcpy(out->deliver_err_report.ud,
+                                       pdu + offset, expected);
+               } else {
++                      if (expected > (int) sizeof(out->deliver_ack_report.ud))
++                              return FALSE;
++
+                       out->deliver_ack_report.udl = udl;
+                       memcpy(out->deliver_ack_report.ud,
+                                       pdu + offset, expected);
+-- 
+2.30.2
+
index a6a4852a63d5073751c7d05537c85bae1f867703..5ae63e6ef6bb0742bb1d023b3c7d6d03bd68c483 100644 (file)
@@ -24,6 +24,7 @@ SRC_URI = "\
     file://CVE-2024-7547.patch \
     file://CVE-2024-7540_CVE-2024-7541_CVE-2024-7542.patch \
     file://CVE-2023-4232.patch \
+    file://CVE-2023-4235.patch \
 "
 SRC_URI[sha256sum] = "93580adc1afd1890dc516efb069de0c5cdfef014415256ddfb28ab172df2d11d"