~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2014-3158

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2014-11-15
2
 
Candidate: CVE-2014-3158
3
 
PublicDate: 2014-11-15
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
6
 
 http://marc.info/?l=linux-ppp&m=140764978420764
7
 
 http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html
8
 
 https://usn.ubuntu.com/usn/usn-2429-1
9
 
Description:
10
 
 Integer overflow in the getword function in options.c in pppd in Paul's PPP
11
 
 Package (ppp) before 2.4.7 allows attackers to "access privileged options"
12
 
 via a long word in an options file, which triggers a heap-based buffer
13
 
 overflow that "[corrupts] security-relevant variables."
14
 
Ubuntu-Description:
15
 
Notes:
16
 
Bugs:
17
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762789
18
 
 https://bugzilla.redhat.com/show_bug.cgi?id=1128748
19
 
Priority: medium
20
 
Discovered-by:
21
 
Assigned-to: mdeslaur
22
 
 
23
 
Patches_ppp:
24
 
 upstream: https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb
25
 
upstream_ppp: released (2.4.6-3)
26
 
lucid_ppp: released (2.4.5~git20081126t100229-0ubuntu3.1)
27
 
precise_ppp: released (2.4.5-5ubuntu1.1)
28
 
trusty_ppp: released (2.4.5-5.1ubuntu2.1)
29
 
utopic_ppp: released (2.4.5-5.1ubuntu3.1)
30
 
devel_ppp: released (2.4.5-5.1ubuntu5)