Debian: DSA-3228-1: ppp security update
Debian: DSA-3228-1: ppp security update
Emanuele Rocca discovered that ppp, a daemon implementing the Point-to-Point Protocol, was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon.
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3228-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Sebastien Delafond April 16, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ppp CVE ID : CVE-2015-3310 Debian Bug : 782450 Emanuele Rocca discovered that ppp, a daemon implementing the Point-to-Point Protocol, was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon. For the stable distribution (wheezy), this problem has been fixed in version 2.4.5-5.1+deb7u2. For the upcoming stable distribution (jessie) and unstable distribution (sid), this problem has been fixed in version 2.4.6-3.1. We recommend that you upgrade your ppp packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.