Package : ppp Version : 2.4.5-4+deb6u1 CVE ID : CVE-2014-3158 Debian Bug : http://bugs.debian.org/762789 This updates fixes a potential integer overflow in option parsing. A user in the group "dip" could provide a specially crafted configuration file of more than 2G and generate an integer overflow. This may enable an attacker to overwrite the heap and thereby corrupt security-relevant variables. See details in the upstream commit: https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb PS: This upload has been prepared by Andrew Bartlett <abartlet+debian@catalyst.net.nz>, I'm just sponsoring his work. -- Raphaël Hertzog ◈ Debian Developer Support Debian LTS: http://www.freexian.com/services/debian-lts.html Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature