CVE-2019-20795
Publication date 9 May 2020
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| iproute2 | 20.04 LTS focal |
Not affected
|
| 18.04 LTS bionic |
Fixed 4.15.0-2ubuntu1.1
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty |
Not affected
|
Notes
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | High |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4357-1
- IPRoute vulnerability
- 13 May 2020