[USN-3810-1] ppp vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”AlKCquCMNmQYIU6jsRL4Mhom18bZXqKzY”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–AlKCquCMNmQYIU6jsRL4Mhom18bZXqKzY

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3810-1] ppp vulnerability

–zMduaXl2DfUDqEOkMNFZQZYPSXQ3Z54pR

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3810-1
November 06, 2018

ppp vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

ppp could be made to crash or bypass authentication if it received
specially crafted network traffic.

Software Description:
– ppp: Point-to-Point Protocol (PPP)

Details:

Ivan Gotovchits discovered that ppp incorrectly handled the EAP-TLS
protocol. A remote attacker could use this issue to cause ppp to crash,
resulting in a denial of service, or possibly bypass authentication.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
ppp 2.4.7-2+2ubuntu1.1

Ubuntu 16.04 LTS:
ppp 2.4.7-1+2ubuntu1.16.04.1

Ubuntu 14.04 LTS:
ppp 2.4.5-5.1ubuntu2.3

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3810-1
CVE-2018-11574

Package Information:
https://launchpad.net/ubuntu/+source/ppp/2.4.7-2+2ubuntu1.1
https://launchpad.net/ubuntu/+source/ppp/2.4.7-1+2ubuntu1.16.04.1
https://launchpad.net/ubuntu/+source/ppp/2.4.5-5.1ubuntu2.3

–zMduaXl2DfUDqEOkMNFZQZYPSXQ3Z54pR–

–AlKCquCMNmQYIU6jsRL4Mhom18bZXqKzY

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=qX8G
—–END PGP SIGNATURE—–

–AlKCquCMNmQYIU6jsRL4Mhom18bZXqKzY–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK