Headline
CVE-2020-15704: USN-4451-2: ppp vulnerability | Ubuntu security notices | Ubuntu
The modprobe child process in the ./debian/patches/load_ppp_generic_if_needed patch file incorrectly handled module loading. A local non-root attacker could exploit the MODPROBE_OPTIONS environment variable to read arbitrary root files. Fixed in 2.4.5-5ubuntu1.4, 2.4.5-5.1ubuntu2.3+esm2, 2.4.7-1+2ubuntu1.16.04.3, 2.4.7-2+2ubuntu1.3, 2.4.7-2+4.1ubuntu5.1, 2.4.7-2+4.1ubuntu6. Was ZDI-CAN-11504.
Packages
- ppp - Point-to-Point Protocol (PPP)
Details
USN-4451-1 fixed a vulnerability in ppp. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Thomas Chauchefoin working with Trend Micro´s Zero Day Initiative,
discovered that ppp incorrectly handled module loading. A local attacker
could use this issue to load arbitrary kernel modules and possibly execute
arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
- ppp - 2.4.5-5.1ubuntu2.3+esm2
Ubuntu 12.04
- ppp - 2.4.5-5ubuntu1.4
In general, a standard system update will make all the necessary changes.
Related notices
- USN-4451-1: ppp-dev, ppp-udeb, ppp