diff options
| author | Archana Polampalli <archana.polampalli@windriver.com> | 2024-05-03 11:41:52 +0000 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2024-05-15 09:44:14 -0700 |
| commit | 88287ba5217fc564e7f61ecfd95d3c8056995c82 (patch) | |
| tree | 7cac42ce3c2d32fd5d5e4f64f5b201b2c3911678 /scripts/lib/devtool/utilcmds.py | |
| parent | 2b21c6009aa6b955e1a0e7312c3c0ad66557681b (diff) | |
| download | poky-88287ba5217fc564e7f61ecfd95d3c8056995c82.tar.gz | |
ofono: fix CVE-2023-4234
A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug
is triggered within the decode_submit_report() function during the SMS decoding.
It is assumed that the attack scenario is accessible from a compromised modem,
a malicious base station, or just SMS. There is a bound check for this memcpy
length in decode_submit(), but it was forgotten in decode_submit_report().
(From OE-Core rev: 51cf006ac7b5b97e65864fb1cb6f5b47192c4ebf)
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/lib/devtool/utilcmds.py')
0 files changed, 0 insertions, 0 deletions
