[Bug 1225833] New: VUL-0: CVE-2024-36845: libmodbus: denial of service due to an invalid pointer in the modbus_receive() function
https://bugzilla.suse.com/show_bug.cgi?id=1225833 Bug ID: 1225833 Summary: VUL-0: CVE-2024-36845: libmodbus: denial of service due to an invalid pointer in the modbus_receive() function Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/408372/ OS: Other Status: NEW Severity: Major Priority: P5 - None Component: Security Assignee: sbrabec@suse.com Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: camila.matos@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- An invalid pointer in the modbus_receive() function of libmodbus v3.1.6 allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-36845 https://www.cve.org/CVERecord?id=CVE-2024-36845 https://github.com/stephane/libmodbus/issues/750 https://bugzilla.redhat.com/show_bug.cgi?id=2284259 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1225833 SMASH SMASH <smash_bz@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard| |CVSSv3.1:SUSE:CVE-2024-3684 | |5:7.5:(AV:N/AC:L/PR:N/UI:N/ | |S:U/C:N/I:N/A:H) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1225833 Maintenance Automation <maint-coord+maintenance-robot@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1225833 https://bugzilla.suse.com/show_bug.cgi?id=1225833#c2 Stanislav Brabec <sbrabec@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CONFIRMED --- Comment #2 from Stanislav Brabec <sbrabec@suse.com> --- Checking the upstream, there is no fix. The upstream issue has no progress. Redhat Bugzilla has no progress yet. According to the reporter, it seems to be array out of bound access that triggers the crash. Is it serious enough to start a research? Note that we have no Modbus testing hardware. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1225833 https://bugzilla.suse.com/show_bug.cgi?id=1225833#c3 Stanislav Brabec <sbrabec@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|CONFIRMED |RESOLVED --- Comment #3 from Stanislav Brabec <sbrabec@suse.com> --- According to the upstream, this problem was fixed in libmodbus-3.1.7. All affected repositories already contain libmodbus-3.1.10, which is not affected. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com