[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 74-1] ppp security update



Package        : ppp
Version        : 2.4.5-4+deb6u1
CVE ID         : CVE-2014-3158
Debian Bug     : http://bugs.debian.org/762789

This updates fixes a potential integer overflow in option parsing.

A user in the group "dip" could provide a specially crafted
configuration file of more than 2G and generate an integer overflow.
This may enable an attacker to overwrite the heap and thereby corrupt
security-relevant variables.

See details in the upstream commit:
https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb

PS: This upload has been prepared by Andrew Bartlett
<abartlet+debian@catalyst.net.nz>, I'm just sponsoring his work.
-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/

Attachment: signature.asc
Description: Digital signature


Reply to: