Bug 1225826 (CVE-2024-36843)

Summary: VUL-0: CVE-2024-36843: libmodbus: heap overflow via the modbus_mapping_free() function
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Stanislav Brabec <sbrabec>
Status: CONFIRMED --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: camila.matos
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/408370/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-36843:8.2:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-06-03 11:31:27 UTC
libmodbus v3.1.6 was discovered to contain a heap overflow via the modbus_mapping_free() function.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-36843
https://www.cve.org/CVERecord?id=CVE-2024-36843
https://github.com/stephane/libmodbus/issues/748
https://bugzilla.redhat.com/show_bug.cgi?id=2284252
Comment 2 Stanislav Brabec 2024-06-11 18:03:16 UTC
Checking the upstream, there is no fix. The upstream issue has no progress. Redhat Bugzilla has no progress yet.

It looks either like a double free() or a memory corruption that could be possibly found by valgring.

Is it serious enough to start a research? Note that we have no Modbus testing hardware.