|
|
Subscribe / Log in / New account

Mageia alert MGASA-2020-0139 (ppp)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2020-0139: Updated ppp packages fix security vulnerability
Date:  Thu, 12 Mar 2020 22:47:55 +0100
Message-ID:  <20200312214757.5A0499F745@duvel.mageia.org>

MGASA-2020-0139 - Updated ppp packages fix security vulnerability Publication date: 12 Mar 2020 URL: https://advisories.mageia.org/MGASA-2020-0139.html Type: security Affected Mageia releases: 7 CVE: CVE-2020-8597 Description: Updated ppp packages fix security vulnerability: Ilja Van Sprundel discovered a buffer overflow vulnerability in ppp. When receiving an EAP Request message in client mode, an attacker was able to overflow the rhostname array by providing a very long name (CVE-2020-8597). References: - https://bugs.mageia.org/show_bug.cgi?id=26217 - https://www.debian.org/lts/security/2020/dla-2097 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597 SRPMS: - 7/core/ppp-2.4.7-13.1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds