CVE-2020-22283

NameCVE-2020-22283
DescriptionA buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3655-1
Debian Bugs991645

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lwip (PTS)bullseye2.1.2+dfsg1-8+deb11u1fixed
bookworm2.1.3+dfsg1-2fixed
sid, trixie2.2.0+dfsg1-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lwipsourcebuster2.0.3-3+deb10u2DLA-3655-1
lwipsourcebullseye2.1.2+dfsg1-8+deb11u1
lwipsource(unstable)2.1.3+dfsg1-1991645

Notes

https://savannah.nongnu.org/bugs/index.php?58553
Pre-requisite: http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=d843e47a1d65451bd7f7aaa5017b408bd108be88 (master)
Fixed by: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=489405839ae0fea8b99c4896f632eb688dc8a19a (master)
Fixed by: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=488d4ad2460c3b41bef69724cad89c28a905eda9 (master)
Pre-requisite: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=8f5a0aaacb8d88f65780cb87f14d4cff7c47c44e (STABLE-2_1_3_RC1)
Fixed by: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=6ffe30d9ba394e25844019e19ade4dc28d76f65d (STABLE-2_1_3_RC1)
Fixed by: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=ecd6009a5e64c98eb91df666b86b1ce7715675be (STABLE-2_1_3_RC1)

Search for package or bug name: Reporting problems