{"id":"CVE-2022-0367","details":"A heap-based buffer overflow flaw was found in libmodbus in function modbus_reply() in src/modbus.c.","modified":"2026-04-11T23:37:34.971796Z","published":"2022-08-29T15:15:09.370Z","related":["openSUSE-SU-2022:10196-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00010.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00007.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045571"},{"type":"FIX","url":"https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6"},{"type":"FIX","url":"https://github.com/stephane/libmodbus/issues/614"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/stephane/libmodbus","events":[{"introduced":"0"},{"fixed":"3da2d01916ef118aba30a1951d89e0ca0f90e2f7"},{"fixed":"b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.1.7"}]}}],"versions":["v1.2.2","v2.1.0","v2.9.1","v2.9.2","v2.9.3","v2.9.4","v3.0.0","v3.0.1","v3.1.0","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-0367.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"vanir_signatures":[{"deprecated":false,"source":"https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6","target":{"file":"src/modbus.c"},"digest":{"threshold":0.9,"line_hashes":["315484959380180879673975876554454419256","163205760916264436916406636998934894044","98839181467345169972032702267087140137","285662054722586012298185867408727781136"]},"signature_version":"v1","id":"CVE-2022-0367-8610e04e","signature_type":"Line"}],"vanir_signatures_modified":"2026-04-11T23:37:34Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}