CVE-2020-15704

The modprobe child process in the ./debian/patches/load_ppp_generic_if_needed patch file incorrectly handled module loading. A local non-root attacker could exploit the MODPROBE_OPTIONS environment variable to read arbitrary root files. Fixed in 2.4.5-5ubuntu1.4, 2.4.5-5.1ubuntu2.3+esm2, 2.4.7-1+2ubuntu1.16.04.3, 2.4.7-2+2ubuntu1.3, 2.4.7-2+4.1ubuntu5.1, 2.4.7-2+4.1ubuntu6. Was ZDI-CAN-11504.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:canonical:ppp:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:canonical:ppp:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:canonical:ppp:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:canonical:ppp:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:canonical:ppp:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
References () https://ubuntu.com/security/notices/USN-4451-1 - Vendor Advisory () https://ubuntu.com/security/notices/USN-4451-1 - Vendor Advisory
References () https://ubuntu.com/security/notices/USN-4451-2 - Vendor Advisory () https://ubuntu.com/security/notices/USN-4451-2 - Vendor Advisory

Information

Published : 2020-09-01 00:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-15704

Mitre link : CVE-2020-15704

CVE.ORG link : CVE-2020-15704


JSON object : View

Products Affected

canonical

  • ppp
  • ubuntu_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-20

Improper Input Validation