Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.
{ "binaries": [ { "binary_name": "libmodbus-dev", "binary_version": "3.1.6-2" }, { "binary_name": "libmodbus5", "binary_version": "3.1.6-2" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-10918.json"
{ "binaries": [ { "binary_name": "libmodbus-dev", "binary_version": "3.1.10-1ubuntu1" }, { "binary_name": "libmodbus5", "binary_version": "3.1.10-1ubuntu1" } ] }
{ "binaries": [ { "binary_name": "libmodbus-dev", "binary_version": "3.0.5-1ubuntu0.1~esm1" }, { "binary_name": "libmodbus5", "binary_version": "3.0.5-1ubuntu0.1~esm1" } ] }
{ "binaries": [ { "binary_name": "libmodbus-dev", "binary_version": "3.0.6-1ubuntu0.1~esm1" }, { "binary_name": "libmodbus5", "binary_version": "3.0.6-1ubuntu0.1~esm1" } ] }
{ "binaries": [ { "binary_name": "libmodbus-dev", "binary_version": "3.0.6-2+deb9u1build0.18.04.1" }, { "binary_name": "libmodbus5", "binary_version": "3.0.6-2+deb9u1build0.18.04.1" } ] }