RLSA-2020:0633

Source
https://errata.rockylinux.org/RLSA-2020:0633
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2020:0633.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2020:0633
Related
Published
2020-02-27T14:59:09Z
Modified
2023-02-02T12:50:37.003946Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: ppp security update
Details

The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.

Security Fix(es):

  • ppp: Buffer overflow in the eaprequest and eapresponse functions in eap.c (CVE-2020-8597)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / ppp

Package

Name
ppp
Purl
pkg:rpm/rocky-linux/ppp?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2.4.7-26.el8_1