Gentoo Linux Security Advisory 201701-50 - A buffer overflow in PPP might allow remote attackers to cause a Denial of Service condition. Versions less than 2.4.7-r3 are affected.
eb839c40e3c3da25cc0f784f5c0a4545dfb3af6a4cb262819603922a07a75415
Ubuntu Security Notice 2595-1 - It was discovered that ppp incorrectly handled large PIDs. When pppd is used with a RADIUS server, a remote attacker could use this issue to cause it to crash, resulting in a denial of service.
def466910e5e83bbf1a92cb52ee6693b5eefef1adbaf1bc447a1c77ce6c80087
Mandriva Linux Security Advisory 2015-222 - Emanuele Rocca discovered that ppp was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon.
4e085093ca161e2b689a0a77dae2503ae73bb1694acd5b6641e49b4db900aa5e
Slackware Security Advisory - New ppp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.
7a48ee5a01b2016c74691deaae312c4964ac9f83da93f71edd58f4c7ac804936
Debian Linux Security Advisory 3228-1 - Emanuele Rocca discovered that ppp, a daemon implementing the Point-to-Point Protocol, was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon.
3f427866f2b4b74ed9acc0505e613edb072544d44f385fda7f4ca19cbee3d17e