CVE-2020-8597

NameCVE-2020-8597
Descriptioneap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2097-1, DSA-4632-1
Debian Bugs950618, 951291

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lwip (PTS)buster2.0.3-3+deb10u1fixed
buster (security)2.0.3-3+deb10u2fixed
bullseye2.1.2+dfsg1-8+deb11u1fixed
bookworm2.1.3+dfsg1-2fixed
sid2.2.0+dfsg1-6.1fixed
ppp (PTS)buster, buster (security)2.4.7-2+4.1+deb10u1fixed
bullseye2.4.9-1+1fixed
sid, trixie, bookworm2.4.9-1+1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lwipsourcebuster2.0.3-3+deb10u1
lwipsource(unstable)2.1.2+dfsg1-5951291
pppsourcejessie2.4.6-3.1+deb8u1DLA-2097-1
pppsourcestretch2.4.7-1+4+deb9u1DSA-4632-1
pppsourcebuster2.4.7-2+4.1+deb10u1DSA-4632-1
pppsource(unstable)2.4.8-1+1950618

Notes

http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=2ee3cbe69c6d2805e64e7cac2a1c1706e49ffd86
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426

Search for package or bug name: Reporting problems