summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/ppp/ppp
Commit message (Collapse)AuthorAgeFilesLines
* ppp: Security Advisory - CVE-2015-3310Roy Li2015-05-291-0/+29
| | | | | | | | | | | | | | | | | | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3310 Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server. oe-core is using ppp 2.4.7, and this CVE say ppp 2.4.7 was not effected, but I found this buggy codes are same between 2.4.6 and 2.4.7, and 2.4.7 should have this issue. (From OE-Core rev: 5b549c6d73e91fdbd0b618a752d618deb1449ef9) Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* ppp: add systemd supportChen Qi2014-04-241-0/+9
| | | | | | | | | | Add systemd support for ppp. The unit file mostly comes from ArchLinux. (From OE-Core rev: e84f7ea24b08e3127b70731908b819fbdc1cbfd5) Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* ppp: upgrade to 2.4.6Hongxu Jia2014-03-0516-0/+839
(From OE-Core rev: d05b1d06b5b8b84c2a40639ad28e31cd683f89a4) Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>