Skip to content

Conversation

@emelianov
Copy link

@emelianov emelianov commented Oct 25, 2017

With some devices Modbus IP packet size is grater than specified in header. So count of bytes to read should be limited by buffer size not packet size from header.

@emelianov
Copy link
Author

addReg and exceptionalResponce needs to be extended with malloc() result checking.

@emelianov emelianov changed the title Critical Fix. Buffer overflow caused random device reboot or hang Critical Fix. Buffer overflow caused random device reboot or hang. Malloc result checking in addReg and exceptionalResponce Feb 15, 2018
@emelianov emelianov changed the title Critical Fix. Buffer overflow caused random device reboot or hang. Malloc result checking in addReg and exceptionalResponce Critical Fix. Buffer overflow caused random device reboot or hang. Malloc result checking in addReg and exceptionalResponce. Fix wrong value for every 8-th reg in read/writeCoils, readInputStats. Jun 22, 2018
@emelianov emelianov changed the title Critical Fix. Buffer overflow caused random device reboot or hang. Malloc result checking in addReg and exceptionalResponce. Fix wrong value for every 8-th reg in read/writeCoils, readInputStats. Critical Fix. Buffer overflow caused random device reboot or hang. Malloc result checking in addReg and exceptionalResponce. Wrong value for every 8-th reg in read/writeCoils, readInputStats. Jun 22, 2018
@emelianov
Copy link
Author

Fix wrong value for every 8-th reg in read/writeCoils, readInputStats

@emelianov emelianov closed this Jun 22, 2018
@emelianov emelianov reopened this Jun 22, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant