public inbox for buildroot@busybox.net
 help / color / mirror / Atom feed
From: Thomas Perale via buildroot <buildroot@buildroot.org>
To: Thomas Perale <thomas.perale@mind.be>
Cc: buildroot@buildroot.org
Subject: Re: [Buildroot] [PATCH] package/rtl_433: add patch for CVE-2025-34450
Date: Fri,  6 Mar 2026 20:53:14 +0100	[thread overview]
Message-ID: <20260306195314.7905-1-thomas.perale@mind.be> (raw)
In-Reply-To: <20260228202847.96486-1-thomas.perale@mind.be>

In reply of:
> Fixes the following vulnerability:
> 
> - CVE-2025-34450:
>     merbanan/rtl_433 versions up to and including 25.02 and prior to
>     commit 25e47f8 contain a stack-based buffer overflow vulnerability in
>     the function parse_rfraw() located in src/rfraw.c. When processing
>     crafted or excessively large raw RF input data, the application may
>     write beyond the bounds of a stack buffer, resulting in memory
>     corruption or a crash. This vulnerability can be exploited to cause a
>     denial of service and, under certain conditions, may be leveraged for
>     further exploitation depending on the execution environment and
>     available mitigations.
> 
> For mroe information, see:
>   - https://www.cve.org/CVERecord?id=CVE-2025-34450
>   - https://github.com/merbanan/rtl_433/commit/25e47f8932f0401392ef1d3c8cc9ed5595bc894a
> 
> Signed-off-by: Thomas Perale <thomas.perale@mind.be>

Applied to 2025.02.x & 2025.11.x. Thanks

> ---
>  ...-overflow-in-rfraw-test-data-parsing.patch | 31 +++++++++++++++++++
>  package/rtl_433/rtl_433.mk                    |  3 ++
>  2 files changed, 34 insertions(+)
>  create mode 100644 package/rtl_433/0002-Fix-overflow-in-rfraw-test-data-parsing.patch
> 
> diff --git a/package/rtl_433/0002-Fix-overflow-in-rfraw-test-data-parsing.patch b/package/rtl_433/0002-Fix-overflow-in-rfraw-test-data-parsing.patch
> new file mode 100644
> index 0000000000..6446fea0ab
> --- /dev/null
> +++ b/package/rtl_433/0002-Fix-overflow-in-rfraw-test-data-parsing.patch
> @@ -0,0 +1,31 @@
> +From 25e47f8932f0401392ef1d3c8cc9ed5595bc894a Mon Sep 17 00:00:00 2001
> +From: "Christian W. Zuckschwerdt" <christian@zuckschwerdt.org>
> +Date: Wed, 8 Oct 2025 10:11:15 +0200
> +Subject: [PATCH] Fix overflow in rfraw test data parsing (closes #3375)
> +
> +CVE: CVE-2025-34450
> +Upstream: https://github.com/merbanan/rtl_433/commit/25e47f8932f0401392ef1d3c8cc9ed5595bc894a
> +Signed-off-by: Thomas Perale <thomas.perale@mind.be>
> +---
> + src/rfraw.c | 5 +++++
> + 1 file changed, 5 insertions(+)
> +
> +diff --git a/src/rfraw.c b/src/rfraw.c
> +index 9f4c9780c..71a1c365d 100644
> +--- a/src/rfraw.c
> ++++ b/src/rfraw.c
> +@@ -159,9 +159,14 @@ static bool parse_rfraw(pulse_data_t *data, char const **p)
> +             data->num_pulses++;
> +             pulse_needed = true;
> +         }
> ++        // abort reading if the pulse data array is full
> ++        if (data->num_pulses >= PD_MAX_PULSES) {
> ++            break;
> ++        }
> +     }
> +     //data->gap[data->num_pulses - 1] = 3000; // TODO: extend last gap?
> + 
> ++    // expand reapeats as long as the pulse data array has enough space
> +     unsigned pkt_pulses = data->num_pulses - prev_pulses;
> +     for (int i = 1; i < repeats && data->num_pulses + pkt_pulses <= PD_MAX_PULSES; ++i) {
> +         memcpy(&data->pulse[data->num_pulses], &data->pulse[prev_pulses], pkt_pulses * sizeof (*data->pulse));
> diff --git a/package/rtl_433/rtl_433.mk b/package/rtl_433/rtl_433.mk
> index 08735be850..fc6c2bece2 100644
> --- a/package/rtl_433/rtl_433.mk
> +++ b/package/rtl_433/rtl_433.mk
> @@ -10,6 +10,9 @@ RTL_433_LICENSE = GPL-2.0+
>  RTL_433_LICENSE_FILES = COPYING
>  RTL_433_CPE_ID_VALID = YES
>  
> +# 0002-Fix-overflow-in-rfraw-test-data-parsing.patch
> +RTL_433_IGNORE_CVES += CVE-2025-34450
> +
>  # Force Release build to remove ASAN.
>  RTL_433_CONF_OPTS = \
>  	-DCMAKE_BUILD_TYPE=Release \
> -- 
> 2.53.0
> 
> _______________________________________________
> buildroot mailing list
> buildroot@buildroot.org
> https://lists.buildroot.org/mailman/listinfo/buildroot
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

      parent reply	other threads:[~2026-03-06 19:53 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-28 20:28 [Buildroot] [PATCH] package/rtl_433: add patch for CVE-2025-34450 Thomas Perale via buildroot
2026-02-28 21:04 ` Julien Olivain via buildroot
2026-03-06 19:53 ` Thomas Perale via buildroot [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260306195314.7905-1-thomas.perale@mind.be \
    --to=buildroot@buildroot.org \
    --cc=thomas.perale@mind.be \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox