Debian Package Tracker
Register | Log in
Subscribe

lwip

Choose email to subscribe with

general
  • source: lwip (main)
  • version: 2.1.3+dfsg1-1
  • maintainer: Joan Lledó (DMD) (DM)
  • arch: all any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.0.3-3+deb10u1
  • stable: 2.1.2+dfsg1-8
  • testing: 2.1.3+dfsg1-1
  • unstable: 2.1.3+dfsg1-1
versioned links
  • 2.0.3-3+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.1.2+dfsg1-8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.1.3+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • liblwip-dev
  • liblwip-doc
  • liblwip0 (1 bugs: 0, 1, 0, 0)
action needed
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2020-22283: A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet.
  • CVE-2020-22284: A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.
Created: 2021-07-29 Last update: 2021-12-05 06:30
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2020-22283: A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet.
  • CVE-2020-22284: A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.
Created: 2021-08-15 Last update: 2021-12-05 06:30
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 2.1.3+dfsg1-2, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 998fe8793b3db39d0b2afdbc326121c7da9e00c1
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Sat Jan 8 17:16:47 2022 +0100

    control: Bump Standards-Version to 4.6.0 (no change)
Created: 2022-01-08 Last update: 2022-05-12 13:09
2 low-priority security issues in buster low

There are 2 open security issues in buster.

2 issues left for the package maintainer to handle:
  • CVE-2020-22283: (needs triaging) A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet.
  • CVE-2020-22284: (needs triaging) A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-07-29 Last update: 2021-12-05 06:30
2 low-priority security issues in bullseye low

There are 2 open security issues in bullseye.

2 issues left for the package maintainer to handle:
  • CVE-2020-22283: (needs triaging) A buffer overflow vulnerability in the icmp6_send_response_with_addrs_and_netif() function of Free Software Foundation lwIP version git head allows attackers to access sensitive information via a crafted ICMPv6 packet.
  • CVE-2020-22284: (needs triaging) A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-08-14 Last update: 2021-12-05 06:30
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2020-08-09 Last update: 2020-08-09 11:54
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2021-11-20] lwip 2.1.3+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-14] Accepted lwip 2.1.3+dfsg1-1 (source) into unstable (Samuel Thibault)
  • [2021-10-31] lwip 2.1.2+dfsg1-9 MIGRATED to testing (Debian testing watch)
  • [2021-10-25] Accepted lwip 2.1.2+dfsg1-9 (source) into unstable (Samuel Thibault)
  • [2020-08-14] lwip 2.1.2+dfsg1-8 MIGRATED to testing (Debian testing watch)
  • [2020-08-09] Accepted lwip 2.1.2+dfsg1-8 (source) into unstable (Joan Lledó)
  • [2020-08-08] Accepted lwip 2.1.2+dfsg1-7 (source amd64 all) into unstable (Joan Lledó)
  • [2020-04-09] Accepted lwip 2.0.3-3+deb10u1 (source amd64 all) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Joan Lledó)
  • [2020-03-13] lwip 2.1.2+dfsg1-6 MIGRATED to testing (Debian testing watch)
  • [2020-03-08] Accepted lwip 2.1.2+dfsg1-6 (source) into unstable (Joan Lledó)
  • [2020-03-08] Accepted lwip 2.1.2+dfsg1-5 (source amd64 all) into unstable (Joan Lledó)
  • [2020-01-31] lwip 2.1.2+dfsg1-4 MIGRATED to testing (Debian testing watch)
  • [2020-01-26] Accepted lwip 2.1.2+dfsg1-4 (source) into unstable (Joan Lledó)
  • [2020-01-18] Accepted lwip 2.1.2+dfsg1-1 (source amd64 all) into unstable (Joan Lledó)
  • [2019-10-10] lwip 2.1.2-5.1 MIGRATED to testing (Debian testing watch)
  • [2019-10-04] Accepted lwip 2.1.2-5.1 (source) into unstable (Boyuan Yang)
  • [2019-09-28] Accepted lwip 2.1.2-5 (source amd64 all) into unstable (Joan Lledó)
  • [2019-09-02] lwip 2.1.2-4 MIGRATED to testing (Debian testing watch)
  • [2019-08-28] Accepted lwip 2.1.2-4 (source) into unstable (Samuel Thibault)
  • [2019-08-24] lwip 2.1.2-3 MIGRATED to testing (Debian testing watch)
  • [2019-08-19] Accepted lwip 2.1.2-3 (source) into unstable (Samuel Thibault)
  • [2019-08-15] lwip 2.1.2-2 MIGRATED to testing (Debian testing watch)
  • [2019-08-09] Accepted lwip 2.1.2-2 (source) into unstable (Samuel Thibault)
  • [2019-03-31] Accepted lwip 2.1.2-1 (source) into experimental (Samuel Thibault)
  • [2018-11-09] lwip 2.0.3-3 MIGRATED to testing (Debian testing watch)
  • [2018-11-03] Accepted lwip 2.0.3-3 (source) into unstable (Samuel Thibault)
  • [2018-06-16] lwip 2.0.3-2 MIGRATED to testing (Debian testing watch)
  • [2018-06-10] Accepted lwip 2.0.3-2 (source amd64 all) into unstable (Samuel Thibault)
  • [2018-06-09] lwip 2.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2018-06-04] Accepted lwip 2.0.3-1 (source amd64 all) into unstable, unstable (Samuel Thibault)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 3
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.1.3+dfsg1-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing