Bug 2278751 (CVE-2023-26793)

Summary: CVE-2023-26793 libmodbus: head buffer overflow in read_io_status()
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: esandeen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2278753, 2278752    
Bug Blocks:    

Description Robb Gatica 2024-05-03 01:33:30 UTC
libmodbus v3.1.10 has a heap-based buffer overflow vulnerability in read_io_status function in src/modbus.c.

https://github.com/stephane/libmodbus/issues/683

Comment 1 Robb Gatica 2024-05-03 01:33:44 UTC
Created libmodbus tracking bugs for this issue:

Affects: epel-all [bug 2278753]
Affects: fedora-all [bug 2278752]

Comment 2 Eric Sandeen 2024-05-03 19:06:42 UTC
There does not seem to be a resolution to this CVE upstream at this time.
The POC is not entirely clear, they may be fuzzing a response to the test server; I've asked for clarification in the github issue.