Security update for ppp package fixing buffer overflow in eap_request and eap_response functions
Reporter | Title | Published | Views | Family All 135 |
---|---|---|---|---|
![]() | ROS-2-450 | 13 Mar 202400:00 | – | redos |
![]() | ROS-2-643 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-807 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-1180 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-837 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-961 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-1711 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-1177 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-940 | 8 Sep 202100:00 | – | redos |
![]() | ROS-2-1822 | 8 Sep 202100:00 | – | redos |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | ppc | ppp-devel | 2.4.5-11.el6_10 | ppp-devel-2.4.5-11.el6_10.ppc.rpm |
RedHat | 6 | i686 | ppp-debuginfo | 2.4.5-11.el6_10 | ppp-debuginfo-2.4.5-11.el6_10.i686.rpm |
RedHat | 6 | x86_64 | ppp | 2.4.5-11.el6_10 | ppp-2.4.5-11.el6_10.x86_64.rpm |
RedHat | 6 | s390x | ppp | 2.4.5-11.el6_10 | ppp-2.4.5-11.el6_10.s390x.rpm |
RedHat | 6 | s390 | ppp-debuginfo | 2.4.5-11.el6_10 | ppp-debuginfo-2.4.5-11.el6_10.s390.rpm |
RedHat | 6 | s390 | ppp-devel | 2.4.5-11.el6_10 | ppp-devel-2.4.5-11.el6_10.s390.rpm |
RedHat | 6 | ppc64 | ppp-devel | 2.4.5-11.el6_10 | ppp-devel-2.4.5-11.el6_10.ppc64.rpm |
RedHat | 6 | x86_64 | ppp-devel | 2.4.5-11.el6_10 | ppp-devel-2.4.5-11.el6_10.x86_64.rpm |
RedHat | 6 | s390x | ppp-devel | 2.4.5-11.el6_10 | ppp-devel-2.4.5-11.el6_10.s390x.rpm |
RedHat | 6 | ppc64 | ppp | 2.4.5-11.el6_10 | ppp-2.4.5-11.el6_10.ppc64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo