A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decodestatusreport() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decodesubmit(), but it was forgotten in decodestatus_report().
{
"binaries": [
{
"binary_version": "1.31-3ubuntu3.24.04.2",
"binary_name": "ofono"
},
{
"binary_version": "1.31-3ubuntu3.24.04.2",
"binary_name": "ofono-dev"
},
{
"binary_version": "1.31-3ubuntu3.24.04.2",
"binary_name": "ofono-scripts"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "1.17.bzr6912+16.04.20160314.3-0ubuntu1+esm2",
"binary_name": "ofono"
},
{
"binary_version": "1.17.bzr6912+16.04.20160314.3-0ubuntu1+esm2",
"binary_name": "ofono-dev"
},
{
"binary_version": "1.17.bzr6912+16.04.20160314.3-0ubuntu1+esm2",
"binary_name": "ofono-scripts"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "1.21-1ubuntu1+esm2",
"binary_name": "ofono"
},
{
"binary_version": "1.21-1ubuntu1+esm2",
"binary_name": "ofono-dev"
},
{
"binary_version": "1.21-1ubuntu1+esm2",
"binary_name": "ofono-scripts"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "1.31-2ubuntu1+esm2",
"binary_name": "ofono"
},
{
"binary_version": "1.31-2ubuntu1+esm2",
"binary_name": "ofono-dev"
},
{
"binary_version": "1.31-2ubuntu1+esm2",
"binary_name": "ofono-scripts"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}