summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2025-01-14 08:03:19 +0000
committerSteve Sakoman <steve@sakoman.com>2025-01-18 06:21:02 -0800
commit481b2600a934965246311afd5bdb86a299beb310 (patch)
tree1e1f14ed4cbbbc61e1351a25320e6cfb0680d9db /meta/recipes-connectivity
parent380c41b66740b4b3ab17e6fc787441621f65078b (diff)
downloadpoky-481b2600a934965246311afd5bdb86a299beb310.tar.gz
ofono: fix CVE-2024-7544
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23457. Reference: https://security-tracker.debian.org/tracker/CVE-2024-7544 Upstream patch: https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=a240705a0d5d41eca6de4125ab2349ecde4c873a (From OE-Core rev: c4e7d6fad2ed96296bcea2b7d12b41e1354eafa8) Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-connectivity')
-rw-r--r--meta/recipes-connectivity/ofono/ofono/CVE-2024-7544.patch30
-rw-r--r--meta/recipes-connectivity/ofono/ofono_1.34.bb1
2 files changed, 31 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/ofono/ofono/CVE-2024-7544.patch b/meta/recipes-connectivity/ofono/ofono/CVE-2024-7544.patch
new file mode 100644
index 0000000000..ebbf809030
--- /dev/null
+++ b/meta/recipes-connectivity/ofono/ofono/CVE-2024-7544.patch
@@ -0,0 +1,30 @@
1From a240705a0d5d41eca6de4125ab2349ecde4c873a Mon Sep 17 00:00:00 2001
2From: Ivaylo Dimitrov <ivo.g.dimitrov.75@gmail.com>
3Date: Tue, 3 Dec 2024 21:43:49 +0200
4Subject: [PATCH] stkutil: Fix CVE-2024-7544
5
6CVE: CVE-2024-7544
7Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=a240705a0d5d41eca6de4125ab2349ecde4c873a]
8
9Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
10---
11 src/stkutil.c | 4 ++++
12 1 file changed, 4 insertions(+)
13
14diff --git a/src/stkutil.c b/src/stkutil.c
15index fdd11ad..475caaa 100644
16--- a/src/stkutil.c
17+++ b/src/stkutil.c
18@@ -1898,6 +1898,10 @@ static bool parse_dataobj_mms_id(struct comprehension_tlv_iter *iter,
19
20 data = comprehension_tlv_iter_get_data(iter);
21 mi->len = len;
22+
23+ if (len > sizeof(mi->id))
24+ return false;
25+
26 memcpy(mi->id, data, len);
27
28 return true;
29--
302.40.0
diff --git a/meta/recipes-connectivity/ofono/ofono_1.34.bb b/meta/recipes-connectivity/ofono/ofono_1.34.bb
index 731b186b12..54710aa9fd 100644
--- a/meta/recipes-connectivity/ofono/ofono_1.34.bb
+++ b/meta/recipes-connectivity/ofono/ofono_1.34.bb
@@ -20,6 +20,7 @@ SRC_URI = "\
20 file://CVE-2023-2794-0004.patch \ 20 file://CVE-2023-2794-0004.patch \
21 file://CVE-2024-7539.patch \ 21 file://CVE-2024-7539.patch \
22 file://CVE-2024-7543.patch \ 22 file://CVE-2024-7543.patch \
23 file://CVE-2024-7544.patch \
23" 24"
24SRC_URI[sha256sum] = "c0b96d3013447ec2bcb74579bef90e4e59c68dbfa4b9c6fbce5d12401a43aac7" 25SRC_URI[sha256sum] = "c0b96d3013447ec2bcb74579bef90e4e59c68dbfa4b9c6fbce5d12401a43aac7"
25 26