aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPengquan Meng <mpq@google.com>2018-03-23 14:29:55 -0700
committerMichael W <baddaemon87@gmail.com>2018-06-11 19:19:12 +0200
commita0b9446e8503764713624f312f2aca7ff8de8c0b (patch)
treecdd52827f9b22129c717bb808831c6471c4a2e33
parent254510883995be5e0a971583db490ec7f7bbc550 (diff)
downloadandroid_frameworks_opt_telephony-cm-14.1.tar.gz
android_frameworks_opt_telephony-cm-14.1.tar.bz2
android_frameworks_opt_telephony-cm-14.1.zip
Fixed invalid pdu issuecm-14.1
The device may receive invalid sms pdu, i.e the pdu contins sms header with an invalid seqNumber. This caused InboundSmsHandler crashed constantly. This CL added the range check for the seqNumber to ensure the InboundSmsHandler will not crash even if the seqNumber is invalid. Test: runtest -x GsmInboundSmsHandlerTest -m testMultiPartSmsWithInvalidSeqNumber Bug: 72298611 Merged-In: Icf291c8530abdc2a528c5cf227cf00135281b899 Change-Id: Icf291c8530abdc2a528c5cf227cf00135281b899 (cherry picked from commit 9eec9d02937dd41fc94ad1c874f8467f4698df5c) (cherry picked from commit d2f410c0ff07c5a7b79e61bc36527b0259677de7) (cherry picked from commit e8955271c5ca1595ae7c495b6cd7c5f8515d65ea) CVE-2018-9362
-rw-r--r--src/java/com/android/internal/telephony/InboundSmsHandler.java29
1 files changed, 29 insertions, 0 deletions
diff --git a/src/java/com/android/internal/telephony/InboundSmsHandler.java b/src/java/com/android/internal/telephony/InboundSmsHandler.java
index 71962f8f2..d96438cdf 100644
--- a/src/java/com/android/internal/telephony/InboundSmsHandler.java
+++ b/src/java/com/android/internal/telephony/InboundSmsHandler.java
@@ -82,6 +82,7 @@ import java.util.Arrays;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
+import android.util.EventLog;
/**
* This class broadcasts incoming SMS messages to interested apps after storing them in
@@ -794,6 +795,19 @@ public abstract class InboundSmsHandler extends StateMachine {
int destPort = tracker.getDestPort();
boolean block = false;
+ // Do not process when the message count is invalid.
+ if (messageCount <= 0) {
+ EventLog.writeEvent(
+ 0x534e4554 /* snetTagId */,
+ "72298611" /* buganizer id */,
+ -1 /* uid */,
+ String.format(
+ "processMessagePart: invalid messageCount = %d",
+ messageCount));
+
+ return false;
+ }
+
if (messageCount == 1) {
// single-part message
pdus = new byte[][]{tracker.getPdu()};
@@ -829,6 +843,21 @@ public abstract class InboundSmsHandler extends StateMachine {
int index = cursor.getInt(PDU_SEQUENCE_PORT_PROJECTION_INDEX_MAPPING
.get(SEQUENCE_COLUMN)) - tracker.getIndexOffset();
+ // The invalid PDUs can be received and stored in the raw table. The range
+ // check ensures the process not crash even if the seqNumber in the
+ // UserDataHeader is invalid.
+ if (index >= pdus.length || index < 0) {
+ EventLog.writeEvent(
+ 0x534e4554 /* snetTagId */,
+ "72298611" /* buganizer id */,
+ -1 /* uid */,
+ String.format(
+ "processMessagePart: invalid seqNumber = %d, messageCount = %d",
+ index + tracker.getIndexOffset(),
+ messageCount));
+ continue;
+ }
+
pdus[index] = HexDump.hexStringToByteArray(cursor.getString(
PDU_SEQUENCE_PORT_PROJECTION_INDEX_MAPPING.get(PDU_COLUMN)));