CVE-2019-20795

iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iproute2_project:iproute2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 04:39

Type Values Removed Values Added
References () https://bugzilla.suse.com/show_bug.cgi?id=1171452 - Issue Tracking, Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=1171452 - Issue Tracking, Third Party Advisory
References () https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10 - Patch, Third Party Advisory () https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10 - Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/202008-06 - Third Party Advisory () https://security.gentoo.org/glsa/202008-06 - Third Party Advisory
References () https://usn.ubuntu.com/4357-1/ - Third Party Advisory () https://usn.ubuntu.com/4357-1/ - Third Party Advisory

Information

Published : 2020-05-09 21:15

Updated : 2024-11-21 04:39


NVD link : CVE-2019-20795

Mitre link : CVE-2019-20795

CVE.ORG link : CVE-2019-20795


JSON object : View

Products Affected

canonical

  • ubuntu_linux

iproute2_project

  • iproute2
CWE
CWE-416

Use After Free