{"id":"CVE-2014-9645","details":"The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an \"ifconfig /usbserial up\" command or a \"mount -t /snd_pcm none /\" command.","modified":"2026-01-27T04:13:34.308554Z","published":"2017-03-12T06:59:00Z","withdrawn":"2026-01-27T04:13:34.308554Z","related":["MGASA-2015-0041","SUSE-SU-2015:1445-1","SUSE-SU-2022:4253-1","SUSE-SU-2022:4260-1","SUSE-SU-2022:4371-1","openSUSE-SU-2024:12415-1"],"references":[{"type":"REPORT","url":"http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b"},{"type":"FIX","url":"http://openwall.com/lists/oss-security/2015/01/24/4"},{"type":"FIX","url":"https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201503-13"},{"type":"REPORT","url":"https://bugs.busybox.net/show_bug.cgi?id=7652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1185707"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2020/Mar/15"},{"type":"WEB","url":"http://www.securityfocus.com/bid/72324"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3935-1/"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}