1
PublicDateAtUSN: 2014-11-15
2
Candidate: CVE-2014-3158
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
6
http://marc.info/?l=linux-ppp&m=140764978420764
7
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html
8
https://usn.ubuntu.com/usn/usn-2429-1
10
Integer overflow in the getword function in options.c in pppd in Paul's PPP
11
Package (ppp) before 2.4.7 allows attackers to "access privileged options"
12
via a long word in an options file, which triggers a heap-based buffer
13
overflow that "[corrupts] security-relevant variables."
17
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762789
18
https://bugzilla.redhat.com/show_bug.cgi?id=1128748
24
upstream: https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb
25
upstream_ppp: released (2.4.6-3)
26
lucid_ppp: released (2.4.5~git20081126t100229-0ubuntu3.1)
27
precise_ppp: released (2.4.5-5ubuntu1.1)
28
trusty_ppp: released (2.4.5-5.1ubuntu2.1)
29
utopic_ppp: released (2.4.5-5.1ubuntu3.1)
30
devel_ppp: released (2.4.5-5.1ubuntu5)