First published: Mon Aug 31 2020(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ppp | 2.4.9-1+1 2.4.9-1+1.1 2.5.0-1+2 | |
canonical ppp | <2.4.7-1\+ubuntu1.16.04.3 | |
Ubuntu | =16.04 | |
canonical ppp | <2.4.7-2\+2ubuntu1.3 | |
Ubuntu | =18.04 | |
canonical ppp | <2.4.7-2\+4.1ubuntu5.1 | |
Ubuntu | =20.04 | |
canonical ppp | <2.4.5-5ubuntu1.4 | |
Ubuntu | =12.04 | |
canonical ppp | <2.4.5-5.1ubuntu2.3\+esm2 | |
Ubuntu | =14.04 | |
All of | ||
canonical ppp | <2.4.7-1\+ubuntu1.16.04.3 | |
Ubuntu | =16.04 | |
All of | ||
canonical ppp | <2.4.7-2\+2ubuntu1.3 | |
Ubuntu | =18.04 | |
All of | ||
canonical ppp | <2.4.7-2\+4.1ubuntu5.1 | |
Ubuntu | =20.04 | |
All of | ||
canonical ppp | <2.4.5-5ubuntu1.4 | |
Ubuntu | =12.04 | |
All of | ||
canonical ppp | <2.4.5-5.1ubuntu2.3\+esm2 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15704 has a high severity rating due to its potential exploitation by local non-root attackers to read arbitrary root files.
To fix CVE-2020-15704, update the ppp package to version 2.4.5-5ubuntu1.4 or later.
CVE-2020-15704 affects ppp versions prior to 2.4.5-5ubuntu1.4.
Yes, a local non-root user can exploit CVE-2020-15704 to access root-level files.
Systems running affected versions of the ppp package, particularly on Debian and Ubuntu, are vulnerable to CVE-2020-15704.