Control: clone -1 -2
Control: retitle -1 ofono CVE-2024-7538 CVE-2024-7539 CVE-2024-7540 CVE-2024-7541 CVE-2024-7542 CVE-2024-7543 CVE-2024-7544 CVE-2024-7545 CVE-2024-7546 CVE-2024-7547
Control: retitle -2 ofono: CVE-2024-7537
CVE-2024-7538[1]:
| oFono CUSD AT Command Stack-based Buffer Overflow Code Execution
| Vulnerability. This vulnerability allows local attackers to execute
| arbitrary code on affected installations of oFono. An attacker must
| first obtain the ability to execute code on the target modem in
| order to exploit this vulnerability. The specific flaw exists
| within the parsing of responses from AT Commands. The issue results
| from the lack of proper validation of the length of user-supplied
| data prior to copying it to a stack-based buffer. An attacker can
| leverage this vulnerability to execute code in the context of root.
| Was ZDI-CAN-23190.
We think that CVE-2024-7538 has been fixed alongside the fix of CVE-2024-7539.
See: https://salsa.debian.org/telepathy-team/ofono/-/commit/f11771ba52b3597302d7f3472d96034ee4e17dba
(uploaded to Debian with ofono 2.14-1).
With this in mind, I'd like to see #1078555 closed after the factoring out.
@Debian sec team:
* Please provide feedback on the above.
* Please close #1078555 if you agree with my above reasonings.
* Please downgrade severity of the new #-2 bug if you agree
or follow-up on this mail.
On Sat, Mar 01, 2025 at 02:23:29PM +0100, Mike Gabriel wrote:
Control: clone -1 -2
Control: retitle -1 ofono CVE-2024-7538 CVE-2024-7539 CVE-2024-7540
CVE-2024-7541 CVE-2024-7542 CVE-2024-7543 CVE-2024-7544
CVE-2024-7545 CVE-2024-7546 CVE-2024-7547
Control: retitle -2 ofono: CVE-2024-7537
CVE-2024-7538[1]:
| oFono CUSD AT Command Stack-based Buffer Overflow Code Execution
| Vulnerability. This vulnerability allows local attackers to execute
| arbitrary code on affected installations of oFono. An attacker must
| first obtain the ability to execute code on the target modem in
| order to exploit this vulnerability. The specific flaw exists
| within the parsing of responses from AT Commands. The issue results
| from the lack of proper validation of the length of user-supplied
| data prior to copying it to a stack-based buffer. An attacker can
| leverage this vulnerability to execute code in the context of root.
| Was ZDI-CAN-23190.
We think that CVE-2024-7538 has been fixed alongside the fix of
CVE-2024-7539.
See:
https://salsa.debian.org/telepathy-team/ofono/-/commit/f11771ba52b3597302d7f3472d96034ee4e17dba
(uploaded to Debian with ofono 2.14-1).
With this in mind, I'd like to see #1078555 closed after the factoring out. >>
@Debian sec team:
* Please provide feedback on the above.
* Please close #1078555 if you agree with my above reasonings.
* Please downgrade severity of the new #-2 bug if you agree
or follow-up on this mail.
The downgrade seems fine to me. For CVE-2024-7538 it seems likely, but
could you doublecheck with upstream just to be sure?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (1 / 15) |
Uptime: | 160:31:51 |
Calls: | 10,385 |
Calls today: | 2 |
Files: | 14,056 |
Messages: | 6,416,493 |