There are 4 open security issues in bookworm.
1 important issue:
- CVE-2024-10918:
Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.
3 issues left for the package maintainer to handle:
- CVE-2024-36843:
(needs triaging)
libmodbus v3.1.6 was discovered to contain a heap overflow via the modbus_mapping_free() function.
- CVE-2024-36844:
(needs triaging)
libmodbus v3.1.6 was discovered to contain a use-after-free via the ctx->backend pointer. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server.
- CVE-2024-36845:
(needs triaging)
An invalid pointer in the modbus_receive() function of libmodbus v3.1.6 allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server.
You can find information about how to handle these issues in the security team's documentation.