Package: rtl-433
Version: 25.02-1
Severity: important
Tags: patch

According to
<URL:https://security-tracker.debian.org/tracker/CVE-2025-34450 > there
is a security vulnerability with parsing large raw RF input data, as
described in <URL: https://github.com/merbanan/rtl_433/issues/3375 >.  A
fix has been included upstream in
<URL:https://github.com/dd32/rtl_433/commit/25e47f8932f0401392ef1d3c8cc9ed5595bc894a
 >
and is already included in unstable and testing.  But the issue is also
in Debian Trixie/stable and should perhaps be fixed there too?

This is the upstream patch used:

commit 25e47f8932f0401392ef1d3c8cc9ed5595bc894a
Author: Christian W. Zuckschwerdt <[email protected]>
Date:   Wed Oct 8 10:11:15 2025 +0200

    Fix overflow in rfraw test data parsing (closes #3375)

diff --git a/src/rfraw.c b/src/rfraw.c
index 9f4c9780..71a1c365 100644
--- a/src/rfraw.c
+++ b/src/rfraw.c
@@ -159,9 +159,14 @@ static bool parse_rfraw(pulse_data_t *data, char const **p)
             data->num_pulses++;
             pulse_needed = true;
         }
+        // abort reading if the pulse data array is full
+        if (data->num_pulses >= PD_MAX_PULSES) {
+            break;
+        }
     }
     //data->gap[data->num_pulses - 1] = 3000; // TODO: extend last gap?
 
+    // expand reapeats as long as the pulse data array has enough space
     unsigned pkt_pulses = data->num_pulses - prev_pulses;
     for (int i = 1; i < repeats && data->num_pulses + pkt_pulses <= 
PD_MAX_PULSES; ++i) {
         memcpy(&data->pulse[data->num_pulses], &data->pulse[prev_pulses], 
pkt_pulses * sizeof (*data->pulse));

-- 
Happy hacking
Petter Reinholdtsen

Reply via email to