Name | CVE-2019-20795 |
Description | iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
iproute2 (PTS) | bullseye | 5.10.0-4 | fixed |
bookworm | 6.1.0-3 | fixed | |
sid, trixie | 6.12.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
iproute2 | source | jessie | (not affected) | |||
iproute2 | source | stretch | (not affected) | |||
iproute2 | source | (unstable) | 5.2.0-1 |
[buster] - iproute2 <no-dsa> (Minor issue)
[stretch] - iproute2 <not-affected> (Vulnerable code introduced later)
[jessie] - iproute2 <not-affected> (Vulnerable code introduced later)
Fixed by: https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10 (v5.1.0)
Introduced in: https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=86bf43c7c2fdc33d7c021b4a1add1c8facbca51c (v4.15.0)