Mageia 2020-0139: ppp security update
Summary
Updated ppp packages fix security vulnerability:
Ilja Van Sprundel discovered a buffer overflow vulnerability in ppp.
When receiving an EAP Request message in client mode, an attacker was
able to overflow the rhostname array by providing a very long name
(CVE-2020-8597).
References
- https://bugs.mageia.org/show_bug.cgi?id=26217
- https://www.debian.org/lts/security/2020/dla-2097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597
Resolution
MGASA-2020-0139 - Updated ppp packages fix security vulnerability
SRPMS
- 7/core/ppp-2.4.7-13.1.mga7