Source: libmodbus
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for libmodbus.

CVE-2024-36843[0]:
| libmodbus v3.1.6 was discovered to contain a heap overflow via the
| modbus_mapping_free() function.

https://github.com/stephane/libmodbus/issues/748

CVE-2024-36844[1]:
| libmodbus v3.1.6 was discovered to contain a use-after-free via the
| ctx->backend pointer. This vulnerability allows attackers to cause a
| Denial of Service (DoS) via a crafted message sent to the unit-test-
| server.

https://github.com/stephane/libmodbus/issues/749

CVE-2024-36845[2]:
| An invalid pointer in the modbus_receive() function of libmodbus
| v3.1.6 allows attackers to cause a Denial of Service (DoS) via a
| crafted message sent to the unit-test-server.

https://github.com/stephane/libmodbus/issues/750

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-36843
    https://www.cve.org/CVERecord?id=CVE-2024-36843
[1] https://security-tracker.debian.org/tracker/CVE-2024-36844
    https://www.cve.org/CVERecord?id=CVE-2024-36844
[2] https://security-tracker.debian.org/tracker/CVE-2024-36845
    https://www.cve.org/CVERecord?id=CVE-2024-36845

Please adjust the affected versions in the BTS as needed.

Reply via email to