CVE-2019-20795
Publication date 9 May 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.
Status
Package | Ubuntu Release | Status |
---|---|---|
iproute2 | 20.04 LTS focal |
Not affected
|
18.04 LTS bionic |
Fixed 4.15.0-2ubuntu1.1
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4357-1
- IPRoute vulnerability
- 13 May 2020