First published: Sat May 09 2020(Updated: )
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/iproute2 | 5.10.0-4 6.1.0-3 6.10.0-2 | |
Iproute2 | <5.1.0 | |
Ubuntu Linux | =18.04 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-20795 is considered moderate due to its limited impact primarily in configurations that use setuid.
To fix CVE-2019-20795, upgrade to iproute2 version 5.1.0 or later.
iproute2 versions prior to 5.1.0 are affected by CVE-2019-20795.
Disabling setuid usage can serve as a temporary workaround for CVE-2019-20795 until an upgrade is performed.
CVE-2019-20795 typically requires local access and specific configurations, thus remote exploitation is unlikely.