Upstream information

CVE-2020-24336 at MITRE


An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

Note from the SUSE Security Team

SUSE does not ship the uIP stack, also the affected code is not in open-iscsi, so SUSE is not affected by this problem.

SUSE Bugzilla entry: 1179907 [NEW]

No SUSE Security Announcements cross referenced.