[Pkg-telepathy-maintainers] Bug#1078555: ofono: CVE-2024-7537 CVE-2024-7538 CVE-2024-7539 CVE-2024-7540 CVE-2024-7541 CVE-2024-7542 CVE-2024-7543 CVE-2024-7544 CVE-2024-7545 CVE-2024-7546 CVE-2024-7547

Moritz Mühlenhoff jmm at inutil.org
Wed Mar 5 21:55:49 GMT 2025


On Sat, Mar 01, 2025 at 02:23:29PM +0100, Mike Gabriel wrote:
> Control: clone -1 -2
> Control: retitle -1 ofono CVE-2024-7538 CVE-2024-7539 CVE-2024-7540 CVE-2024-7541 CVE-2024-7542 CVE-2024-7543 CVE-2024-7544 CVE-2024-7545 CVE-2024-7546 CVE-2024-7547
> Control: retitle -2 ofono: CVE-2024-7537
> > 
> > CVE-2024-7538[1]:
> > | oFono CUSD AT Command Stack-based Buffer Overflow Code Execution
> > | Vulnerability. This vulnerability allows local attackers to execute
> > | arbitrary code on affected installations of oFono. An attacker must
> > | first obtain the ability to execute code on the target modem in
> > | order to exploit this vulnerability.  The specific flaw exists
> > | within the parsing of responses from AT Commands. The issue results
> > | from the lack of proper validation of the length of user-supplied
> > | data prior to copying it to a stack-based buffer. An attacker can
> > | leverage this vulnerability to execute code in the context of root.
> > | Was ZDI-CAN-23190.
> 
> We think that CVE-2024-7538 has been fixed alongside the fix of CVE-2024-7539.
> 
> See: https://salsa.debian.org/telepathy-team/ofono/-/commit/f11771ba52b3597302d7f3472d96034ee4e17dba
> (uploaded to Debian with ofono 2.14-1).
> 
> With this in mind, I'd like to see #1078555 closed after the factoring out.
> 
> @Debian sec team:
>   * Please provide feedback on the above.
>   * Please close #1078555 if you agree with my above reasonings.
>   * Please downgrade severity of the new #-2 bug if you agree
>     or follow-up on this mail.

The downgrade seems fine to me. For CVE-2024-7538 it seems likely, but
could you doublecheck with upstream just to be sure?

Cheers,
        Moritz



More information about the Pkg-telepathy-maintainers mailing list