Use After Free Affecting iproute2 package, versions *
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-IPROUTE2-568742
- published 10 May 2020
- disclosed 9 May 2020
Introduced: 9 May 2020
CVE-2019-20795 Open this link in a new tabHow to fix?
There is no fixed version for Debian:10
iproute2
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream iproute2
package and not the iproute2
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.
References
- https://security-tracker.debian.org/tracker/CVE-2019-20795
- https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10
- https://security.gentoo.org/glsa/202008-06
- https://bugzilla.suse.com/show_bug.cgi?id=1171452
- https://usn.ubuntu.com/4357-1/
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-20795