It was found that ppp incorrectly handled module loading. A local attacker could use this issue to load arbitrary kernel modules and possibly execute arbitrary code. References: https://ubuntu.com/security/notices/USN-4451-1
Created ppp tracking bugs for this issue: Affects: fedora-all [bug 1866492]
Could you please provide more information? From the Ubuntu link you provided it seems the problem was in Ubuntu downstream patch we never shipped in Fedora. Also I don't understand how this could be security problem. If the malicious user who is running ppp has already permissions to use modprobe and install kernel modules to filesystem, she or he could modprobe/run the malicious code by themselves and they don't need to exploit ppp.
(In reply to Jaroslav Škarvada from comment #2) > Could you please provide more information? From the Ubuntu link you provided > it seems the problem was in Ubuntu downstream patch we never shipped in > Fedora. > > Also I don't understand how this could be security problem. If the malicious > user who is running ppp has already permissions to use modprobe and install > kernel modules to filesystem, she or he could modprobe/run the malicious > code by themselves and they don't need to exploit ppp. Hi Alexander, Can you help with this inquiry? I couldn't find much more info.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15704
External References: http://launchpadlibrarian.net/491880980/ppp_2.4.7-2+4.1ubuntu5_2.4.7-2+4.1ubuntu6.diff.gz http://forum.xbian.org/thread-1748-post-18231.html#pid18231
Statement: Red Hat Product Security does not consider this to be a vulnerability in a Red Hat product as this issue resides in Ubuntu specific patch. Moreover, the described problem that ppp daemon can load module ppp_generic on startup, and this considered to be potentially dangerous, because user can install fake ppp_generic module instead of real. However, only user with high privileges can install new ppp_generic module to correct path for modprobe, so if user have high privileges, then he can load any module he wants anyway.