Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 768234 (CVE-2020-28194)

Summary: net-dialup/accel-ppp: Remote code execution (CVE-2020-28194)
Product: Gentoo Security Reporter: Sam James <sam>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Severity: normal CC: pinkbyte
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: ~2 [ebuild]
Package list:
Runtime testing required: ---

Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-02-01 15:29:49 UTC
"Variable underflow exists in accel-ppp radius/packet.c when receiving a RADIUS vendor-specific attribute with length field is less than 2. It has an impact only when the attacker controls the RADIUS server, which can lead to arbitrary code execution."
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-02-01 15:30:35 UTC
Please bump to a commit equal to or after as per the advisory linked.
Comment 2 Larry the Git Cow gentoo-dev 2021-05-17 08:57:50 UTC
The bug has been closed via the following commit(s):

commit aabfd1c8c3ccd7085da46a10edb29d45811ba2c3
Author:     Sergey Popov <>
AuthorDate: 2021-05-17 08:50:46 +0000
Commit:     Sergey Popov <>
CommitDate: 2021-05-17 08:57:48 +0000

    net-dialup/accel-ppp: drop old vulnerable version
    Package-Manager: Portage-3.0.18, Repoman-3.0.2
    Signed-off-by: Sergey Popov <>

 net-dialup/accel-ppp/Manifest                      |   1 -
 .../accel-ppp-1.12.0_p20200913-r100.ebuild         | 113 ---------------------
 2 files changed, 114 deletions(-)