Updated ppp packages that fix several bugs and add one enhancement are nowavailable for Red Hat Enterprise Linux 6.

The ppp packages contain the Point-to-Point Protocol (PPP) daemon anddocumentation for PPP support. The PPP protocol provides a method fortransmitting datagrams over serial point-to-point links. PPP isusually used to dial in to an Internet Service Provider (ISP) or otherorganization over a modem and phone line.This update fixes the following bugs:* Previously, when the radius client configuration file contained an option notrecognized by the PPP radius plug-in, an error was reported. To fix this bug,the parser for the configuration file has been amended to skip unrecognizedoptions. Now, unknown options are skipped without reporting errors. (BZ#906912)* Prior to this update, the ppp package incorrectly required the logrotatepackage. Consequently, the logrotate package could not be easily uninstalled. Tofix this bug, the hard dependency on the logrotate package has been removed, andit is now possible to easily uninstall the logrotate package. (BZ#922769)* Previously, the Point-to-Point Protocol daemon (PPPD) terminated unexpectedlywhen the pppol2tp plug-in was used, and the PPPD command line contained a dumpoption. To fix this bug, the initialization of the variable containing textualrepresentation of the file descriptor passed to the pppol2tp plug-in has beencorrected. Now, the variable initializes properly, and PPPD no longer crashes inthis scenario. (BZ#1197792)In addition, this update adds the following enhancement:* The ppp package now includes two new plug-ins (pppol2tp.so and openl2tp.so)that allow the use of kernel mode l2tp in dependent packages. As a result, it isnow possible to leverage in-kernel pppo-l2tp protocol implementation by xl2tpdand openl2tpd. (BZ#815128)Users of ppp are advised to upgrade to these updated packages, which fix thesebugs and add this enhancement.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
ppp-2.4.5-10.el6.src.rpm
    MD5: 8ef36f4c003c55832c1763232d3203c9SHA-256: bcc8625a95fea1cf46b55674c88907d5f00de80f9f4e1a16a9a2b3d6aa8e749e
 
IA-32:
ppp-2.4.5-10.el6.i686.rpm
    MD5: b05d0076cd94b40634e8f96c9ad32f81SHA-256: 68fefff6f2ae7050758d1e6b3d10fd1e8313b84f019d394d0b006decb1b8e04e
ppp-debuginfo-2.4.5-10.el6.i686.rpm
    MD5: 4751526698e0bf45fa971f1413b4886bSHA-256: ca1989251576d462d26b67ff5edcde76626949cbc6c2a7574014dd3c38e074f6
ppp-devel-2.4.5-10.el6.i686.rpm
    MD5: be40af0cc8b55d35fc075155d4c80658SHA-256: 0019f2571cbc026f775f4485156ee1660bb9e27ca51889fdf89893c010df3908
 
x86_64:
ppp-2.4.5-10.el6.x86_64.rpm
    MD5: 9e636db0d05cd165027bc5eb1aa7dd96SHA-256: c529b8c6d76e2cd8e18585de09ff09f2e530e4a9c7ae5c189835d26a95851d16
ppp-debuginfo-2.4.5-10.el6.i686.rpm
    MD5: 4751526698e0bf45fa971f1413b4886bSHA-256: ca1989251576d462d26b67ff5edcde76626949cbc6c2a7574014dd3c38e074f6
ppp-debuginfo-2.4.5-10.el6.x86_64.rpm
    MD5: 8d859ea6e5fd545b0901c33c8d35018bSHA-256: b10f312d0ac0d00dd266b0088a89cd2484ddee529525b63a2747bfa14ae90272
ppp-devel-2.4.5-10.el6.i686.rpm
    MD5: be40af0cc8b55d35fc075155d4c80658SHA-256: 0019f2571cbc026f775f4485156ee1660bb9e27ca51889fdf89893c010df3908
ppp-devel-2.4.5-10.el6.x86_64.rpm
    MD5: 18586ad47370bd3234e968fd71352decSHA-256: fd99dccac1d10e2bea931346211ef5babac142967972a0dcf05d9d26ef0825f8
 
Red Hat Enterprise Linux HPC Node FasTrack (v. 6)

SRPMS:
ppp-2.4.5-10.el6.src.rpm
    MD5: 8ef36f4c003c55832c1763232d3203c9SHA-256: bcc8625a95fea1cf46b55674c88907d5f00de80f9f4e1a16a9a2b3d6aa8e749e
 
x86_64:
ppp-2.4.5-10.el6.x86_64.rpm
    MD5: 9e636db0d05cd165027bc5eb1aa7dd96SHA-256: c529b8c6d76e2cd8e18585de09ff09f2e530e4a9c7ae5c189835d26a95851d16
ppp-debuginfo-2.4.5-10.el6.i686.rpm
    MD5: 4751526698e0bf45fa971f1413b4886bSHA-256: ca1989251576d462d26b67ff5edcde76626949cbc6c2a7574014dd3c38e074f6
ppp-debuginfo-2.4.5-10.el6.x86_64.rpm
    MD5: 8d859ea6e5fd545b0901c33c8d35018bSHA-256: b10f312d0ac0d00dd266b0088a89cd2484ddee529525b63a2747bfa14ae90272
ppp-devel-2.4.5-10.el6.i686.rpm
    MD5: be40af0cc8b55d35fc075155d4c80658SHA-256: 0019f2571cbc026f775f4485156ee1660bb9e27ca51889fdf89893c010df3908
ppp-devel-2.4.5-10.el6.x86_64.rpm
    MD5: 18586ad47370bd3234e968fd71352decSHA-256: fd99dccac1d10e2bea931346211ef5babac142967972a0dcf05d9d26ef0825f8
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
ppp-2.4.5-10.el6.src.rpm
    MD5: 8ef36f4c003c55832c1763232d3203c9SHA-256: bcc8625a95fea1cf46b55674c88907d5f00de80f9f4e1a16a9a2b3d6aa8e749e
 
IA-32:
ppp-2.4.5-10.el6.i686.rpm
    MD5: b05d0076cd94b40634e8f96c9ad32f81SHA-256: 68fefff6f2ae7050758d1e6b3d10fd1e8313b84f019d394d0b006decb1b8e04e
ppp-debuginfo-2.4.5-10.el6.i686.rpm
    MD5: 4751526698e0bf45fa971f1413b4886bSHA-256: ca1989251576d462d26b67ff5edcde76626949cbc6c2a7574014dd3c38e074f6
ppp-devel-2.4.5-10.el6.i686.rpm
    MD5: be40af0cc8b55d35fc075155d4c80658SHA-256: 0019f2571cbc026f775f4485156ee1660bb9e27ca51889fdf89893c010df3908
 
PPC:
ppp-2.4.5-10.el6.ppc64.rpm
    MD5: d763527d49e1e1bfdc420936006aa523SHA-256: bdc3abda52f46eb248a111cc92b6e0719cb2289ca8365cce5b58781a324fb3d1
ppp-debuginfo-2.4.5-10.el6.ppc.rpm
    MD5: f76df6cf0f23c89a415cb41d57a049e0SHA-256: d8d50944a4cf93868b48d4de4d533ba1f1f0ba94fb100f10e22908db939cf4c1
ppp-debuginfo-2.4.5-10.el6.ppc64.rpm
    MD5: 19b4dc9306bdfa5a10e08c868a8da624SHA-256: ffea2379a24e06ea6a3c5e99b7e0e6fcfa2969d2df22ba7a3e2963bdbd0929f3
ppp-devel-2.4.5-10.el6.ppc.rpm
    MD5: e123a533e2c38bbdaa72a153f535a1b9SHA-256: 325bce5de9e4dff119f0b13dbdaf4e0a420d71682811ca8641487d242906ef4a
ppp-devel-2.4.5-10.el6.ppc64.rpm
    MD5: 189e8d4b3bdcff6512bf1dc3a61d9c30SHA-256: f8a187886bfd671e06e70d9a2081c7bc50428835fafff48249a7855905f18725
 
s390x:
ppp-2.4.5-10.el6.s390x.rpm
    MD5: 65e5b8bf8cf12c654d40fa4ea2c69e82SHA-256: de5cc23f13b7c86603bf21acf0f8b2aa2c0bcd21f555a4a1e02a112c6d24f4ea
ppp-debuginfo-2.4.5-10.el6.s390.rpm
    MD5: ee6766331c48827db7ad1664dc78d70bSHA-256: b4f32311e25a67c96b5a4579fab2dc2f18ac9a226b4e143a66403bde6805a823
ppp-debuginfo-2.4.5-10.el6.s390x.rpm
    MD5: f4f46b3ff28b5df4a007e5206fbd9f1bSHA-256: f6f2cd981123d8e2ff5e1739a75b6acf8cb365fe587666f3616f44e9b97c658c
ppp-devel-2.4.5-10.el6.s390.rpm
    MD5: 23ffff9bf40be2d4ea7a6b8714cc84e5SHA-256: 542234406f9d4875a8e3a38fece7bc5273322f826056506620ca9c82d29f6c2e
ppp-devel-2.4.5-10.el6.s390x.rpm
    MD5: f9515656e4ef51ffc1516d8a692e1df7SHA-256: 64e05a07b1495ceeae928b089abf2ca8ef3c59c9070d09d420f4a81b954a3581
 
x86_64:
ppp-2.4.5-10.el6.x86_64.rpm
    MD5: 9e636db0d05cd165027bc5eb1aa7dd96SHA-256: c529b8c6d76e2cd8e18585de09ff09f2e530e4a9c7ae5c189835d26a95851d16
ppp-debuginfo-2.4.5-10.el6.i686.rpm
    MD5: 4751526698e0bf45fa971f1413b4886bSHA-256: ca1989251576d462d26b67ff5edcde76626949cbc6c2a7574014dd3c38e074f6
ppp-debuginfo-2.4.5-10.el6.x86_64.rpm
    MD5: 8d859ea6e5fd545b0901c33c8d35018bSHA-256: b10f312d0ac0d00dd266b0088a89cd2484ddee529525b63a2747bfa14ae90272
ppp-devel-2.4.5-10.el6.i686.rpm
    MD5: be40af0cc8b55d35fc075155d4c80658SHA-256: 0019f2571cbc026f775f4485156ee1660bb9e27ca51889fdf89893c010df3908
ppp-devel-2.4.5-10.el6.x86_64.rpm
    MD5: 18586ad47370bd3234e968fd71352decSHA-256: fd99dccac1d10e2bea931346211ef5babac142967972a0dcf05d9d26ef0825f8
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
ppp-2.4.5-10.el6.src.rpm
    MD5: 8ef36f4c003c55832c1763232d3203c9SHA-256: bcc8625a95fea1cf46b55674c88907d5f00de80f9f4e1a16a9a2b3d6aa8e749e
 
IA-32:
ppp-2.4.5-10.el6.i686.rpm
    MD5: b05d0076cd94b40634e8f96c9ad32f81SHA-256: 68fefff6f2ae7050758d1e6b3d10fd1e8313b84f019d394d0b006decb1b8e04e
ppp-debuginfo-2.4.5-10.el6.i686.rpm
    MD5: 4751526698e0bf45fa971f1413b4886bSHA-256: ca1989251576d462d26b67ff5edcde76626949cbc6c2a7574014dd3c38e074f6
ppp-devel-2.4.5-10.el6.i686.rpm
    MD5: be40af0cc8b55d35fc075155d4c80658SHA-256: 0019f2571cbc026f775f4485156ee1660bb9e27ca51889fdf89893c010df3908
 
x86_64:
ppp-2.4.5-10.el6.x86_64.rpm
    MD5: 9e636db0d05cd165027bc5eb1aa7dd96SHA-256: c529b8c6d76e2cd8e18585de09ff09f2e530e4a9c7ae5c189835d26a95851d16
ppp-debuginfo-2.4.5-10.el6.i686.rpm
    MD5: 4751526698e0bf45fa971f1413b4886bSHA-256: ca1989251576d462d26b67ff5edcde76626949cbc6c2a7574014dd3c38e074f6
ppp-debuginfo-2.4.5-10.el6.x86_64.rpm
    MD5: 8d859ea6e5fd545b0901c33c8d35018bSHA-256: b10f312d0ac0d00dd266b0088a89cd2484ddee529525b63a2747bfa14ae90272
ppp-devel-2.4.5-10.el6.i686.rpm
    MD5: be40af0cc8b55d35fc075155d4c80658SHA-256: 0019f2571cbc026f775f4485156ee1660bb9e27ca51889fdf89893c010df3908
ppp-devel-2.4.5-10.el6.x86_64.rpm
    MD5: 18586ad47370bd3234e968fd71352decSHA-256: fd99dccac1d10e2bea931346211ef5babac142967972a0dcf05d9d26ef0825f8
 
(The unlinked packages above are only available from the Red Hat Network)
1197792 – pppd segfaults with dump option906912 – ppp radius plugin breaks on new keywords in radius config file922769 – The ppp package requires logrotate968398 – SELinux is preventing /usr/sbin/pppd from ‘read, write’ accesses on the file pppd2.tdb

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply