ALSA-2020:0633

Source
https://errata.almalinux.org/8/ALSA-2020-0633.html
Import Source
https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2020:0633.json
JSON Data
https://api.test.osv.dev/v1/vulns/ALSA-2020:0633
Related
Published
2020-02-27T14:59:09Z
Modified
2021-08-11T08:54:00Z
Summary
Important: ppp security update
Details

The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.

Security Fix(es):

  • ppp: Buffer overflow in the eaprequest and eapresponse functions in eap.c (CVE-2020-8597)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References

Affected packages

AlmaLinux:8 / ppp

Package

Name
ppp

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.7-26.el8_1

AlmaLinux:8 / ppp-devel

Package

Name
ppp-devel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.7-26.el8_1