Name | CVE-2020-22283 |
Description | A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
Debian Bugs | 991645 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
lwip (PTS) | buster | 2.0.3-3+deb10u1 | vulnerable |
bullseye | 2.1.2+dfsg1-8 | vulnerable | |
bookworm, sid | 2.1.3+dfsg1-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
lwip | source | (unstable) | (unfixed) | 991645 |
[bullseye] - lwip <no-dsa> (Minor issue)
[buster] - lwip <no-dsa> (Minor issue)
https://savannah.nongnu.org/bugs/index.php?58553
Pre-requisite: http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=d843e47a1d65451bd7f7aaa5017b408bd108be88
Fixed by: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=489405839ae0fea8b99c4896f632eb688dc8a19a
Fixed by: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=488d4ad2460c3b41bef69724cad89c28a905eda9