aboutsummaryrefslogtreecommitdiffstats
path: root/english/security/2020/dsa-4632.wml
blob: 46968b89498ac2aa6185a6a8aa9b563e2a1e13a3 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
<define-tag description>security update</define-tag>
<define-tag moreinfo>
<p>Ilja Van Sprundel reported a logic flaw in the Extensible Authentication
Protocol (EAP) packet parser in the Point-to-Point Protocol Daemon
(pppd). An unauthenticated attacker can take advantage of this flaw to
trigger a stack-based buffer overflow, leading to denial of service
(pppd daemon crash).</p>

<p>For the oldstable distribution (stretch), this problem has been fixed
in version 2.4.7-1+4+deb9u1.</p>

<p>For the stable distribution (buster), this problem has been fixed in
version 2.4.7-2+4.1+deb10u1.</p>

<p>We recommend that you upgrade your ppp packages.</p>

<p>For the detailed security status of ppp please refer to its security
tracker page at:
<a href="https://security-tracker.debian.org/tracker/ppp">https://security-tracker.debian.org/tracker/ppp</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2020/dsa-4632.data"
# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy