Point-to-Point Protocol Daemon (pppd) Vulnerability

Latest response

Hello,

Our Security team have reported that our redhat Linux is vulnerable to PPP CVE-2020-8597 vulnerability.

https://www.tenable.com/blog/cve-2020-8597-buffer-overflow-vulnerability-in-point-to-point-protocol-daemon-pppd

How do i check whether my RHEL system is impacted or not. When i do ps -ef | grep -i pppd , no process is running.

If my RHEL OS is impacted, how to remediate? If PPPD is installed, Can i uninstall this packege if its not used rather i patch it?

Please provide the correct and detailed solution as i dont know much about OS administration.

Thank you very much. Cheers.

Mallikarjuna Reddy K

Responses