Skip to navigation

Bug Fix Advisory rp-pppoe bug fix update

Advisory: RHBA-2012:0726-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated rp-pppoe packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The rp-pppoe packages provide the Roaring Penguin PPPoE client, a user-mode
program that does not require any kernel modifications. This client is fully
compliant with RFC 2516, the official PPPoE (Point-to-Point Protocol over
Ethernet) specification.

This update fixes the following bug:

* Prior to this update, the pppoe-server did not correctly calculate the value
of the Access Concentrator (AC) Cookie on Intel 64 and AMD64 platforms. As a
consequence, the pppoe-server did not return a PPPoE active discovery
session-confirmation (PADS) packet to the client. This update modifies the
pppoe-server code so that a PADS packet is returned. (BZ#606403)

All users of rp-pppoe are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
rp-pppoe-3.5-33.el5.src.rpm     MD5: c0e4a9870b1af01a99db393ef9ff4d39
SHA-256: e061eb1487ed1cf479855ac3bc68932973b82cd2c8214f019be898761b41142a
 
IA-32:
rp-pppoe-3.5-33.el5.i386.rpm     MD5: 1e2127770136223152671eb8474e43c9
SHA-256: 652125cd010010529c9550b74ef2b44bc1d1e0b6302d8d3a6daf47e1954318de
rp-pppoe-debuginfo-3.5-33.el5.i386.rpm     MD5: 631bb5e6e12b32e8ec22ff38811ee495
SHA-256: 0a05ac1619eb395882d787f002c4b1e4820009639afacb298f9dbace0968e101
 
IA-64:
rp-pppoe-3.5-33.el5.ia64.rpm     MD5: eb49ad7546880eb5695ed234ee58ff14
SHA-256: 82ff781225c352a5c92bf661cbdc6cd2e17e517da3be3d11915b3cf66595f5f5
rp-pppoe-debuginfo-3.5-33.el5.ia64.rpm     MD5: 5264ed0a6e7a43866c44cfde82f3911b
SHA-256: 559d215567d7b7bd218e0b9fdad9c96b10c19d9912bf93de1fd3d1be352b0b0b
 
PPC:
rp-pppoe-3.5-33.el5.ppc.rpm     MD5: 30fca15654de246647d9dcd589c77f92
SHA-256: ce01065bd33b97e864e13d68fe360a74e3b2a66e31a4af933019992bd43d2cfe
rp-pppoe-debuginfo-3.5-33.el5.ppc.rpm     MD5: a2d4cc57b429599c73d9817c0601619e
SHA-256: 2f8fa0f266f3daf82fb6af9384d25d361fa8beadd444a706bd3d112070792598
 
x86_64:
rp-pppoe-3.5-33.el5.x86_64.rpm     MD5: 395737fd6321825eb861ac10fc6ace05
SHA-256: 098de6d5efdcecd2018d1a53a5f267096dc014c3e68b874a28ee35d48c5727ba
rp-pppoe-debuginfo-3.5-33.el5.x86_64.rpm     MD5: b955fc9be3d44285ceaf239967512910
SHA-256: 71f951671b5916d58792571814cf42f9d2218ffbf64550e926923d1a4c88fc52
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
rp-pppoe-3.5-33.el5.src.rpm     MD5: c0e4a9870b1af01a99db393ef9ff4d39
SHA-256: e061eb1487ed1cf479855ac3bc68932973b82cd2c8214f019be898761b41142a
 
IA-32:
rp-pppoe-3.5-33.el5.i386.rpm     MD5: 1e2127770136223152671eb8474e43c9
SHA-256: 652125cd010010529c9550b74ef2b44bc1d1e0b6302d8d3a6daf47e1954318de
rp-pppoe-debuginfo-3.5-33.el5.i386.rpm     MD5: 631bb5e6e12b32e8ec22ff38811ee495
SHA-256: 0a05ac1619eb395882d787f002c4b1e4820009639afacb298f9dbace0968e101
 
x86_64:
rp-pppoe-3.5-33.el5.x86_64.rpm     MD5: 395737fd6321825eb861ac10fc6ace05
SHA-256: 098de6d5efdcecd2018d1a53a5f267096dc014c3e68b874a28ee35d48c5727ba
rp-pppoe-debuginfo-3.5-33.el5.x86_64.rpm     MD5: b955fc9be3d44285ceaf239967512910
SHA-256: 71f951671b5916d58792571814cf42f9d2218ffbf64550e926923d1a4c88fc52
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

648477 - cannot establish a connection on x86_64



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/