diff options
| author | Archana Polampalli <archana.polampalli@windriver.com> | 2025-07-11 17:03:12 +0530 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2025-07-18 08:32:26 -0700 |
| commit | d668325fd8dbbdb180bf469d60693759ee477034 (patch) | |
| tree | 12306c7fe865d708a730b3122b76354650694fe2 /scripts/devtool | |
| parent | 78620e54fd6cf9006e73aa147721db72930c1dc7 (diff) | |
| download | poky-d668325fd8dbbdb180bf469d60693759ee477034.tar.gz | |
ofono: fix CVE-2023-4232
A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug
is triggered within the decode_status_report() function during the SMS decoding.
It is assumed that the attack scenario is accessible from a compromised modem,
a malicious base station, or just SMS. There is a bound check for this memcpy
length in decode_submit(), but it was forgotten in decode_status_report().
(From OE-Core rev: 02005c81a55930d9f57d44674cdc5eb6171c8c76)
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/devtool')
0 files changed, 0 insertions, 0 deletions
