Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 768234 (CVE-2020-28194) - net-dialup/accel-ppp: Remote code execution (CVE-2020-28194)
Summary: net-dialup/accel-ppp: Remote code execution (CVE-2020-28194)
Alias: CVE-2020-28194
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: ~2 [ebuild]
Depends on:
Reported: 2021-02-01 15:29 UTC by Sam James
Modified: 2021-05-17 08:57 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-02-01 15:29:49 UTC
"Variable underflow exists in accel-ppp radius/packet.c when receiving a RADIUS vendor-specific attribute with length field is less than 2. It has an impact only when the attacker controls the RADIUS server, which can lead to arbitrary code execution."
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-02-01 15:30:35 UTC
Please bump to a commit equal to or after as per the advisory linked.
Comment 2 Larry the Git Cow gentoo-dev 2021-05-17 08:57:50 UTC
The bug has been closed via the following commit(s):

commit aabfd1c8c3ccd7085da46a10edb29d45811ba2c3
Author:     Sergey Popov <>
AuthorDate: 2021-05-17 08:50:46 +0000
Commit:     Sergey Popov <>
CommitDate: 2021-05-17 08:57:48 +0000

    net-dialup/accel-ppp: drop old vulnerable version
    Package-Manager: Portage-3.0.18, Repoman-3.0.2
    Signed-off-by: Sergey Popov <>

 net-dialup/accel-ppp/Manifest                      |   1 -
 .../accel-ppp-1.12.0_p20200913-r100.ebuild         | 113 ---------------------
 2 files changed, 114 deletions(-)