<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Nasty Linux PPPD vulnerability</title>
	<atom:link href="http://www.epanorama.net/blog/2020/03/07/nasty-linux-pppd-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/03/07/nasty-linux-pppd-vulnerability/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 05 May 2026 06:14:58 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: mike williams</title>
		<link>https://www.epanorama.net/blog/2020/03/07/nasty-linux-pppd-vulnerability/comment-page-1/#comment-1707962</link>
		<dc:creator><![CDATA[mike williams]]></dc:creator>
		<pubDate>Thu, 08 Apr 2021 15:06:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185855#comment-1707962</guid>
		<description><![CDATA[thanks for sharing this really interesting and helpful post: &lt;a href=&quot;https://www.aviatbilisi.com/&quot; rel=&quot;nofollow&quot;&gt;Aviabiletebi&lt;/a&gt;]]></description>
		<content:encoded><![CDATA[<p>thanks for sharing this really interesting and helpful post: <a href="https://www.aviatbilisi.com/" rel="nofollow">Aviabiletebi</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kalonkis xelosani</title>
		<link>https://www.epanorama.net/blog/2020/03/07/nasty-linux-pppd-vulnerability/comment-page-1/#comment-1697267</link>
		<dc:creator><![CDATA[Kalonkis xelosani]]></dc:creator>
		<pubDate>Tue, 10 Nov 2020 18:00:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185855#comment-1697267</guid>
		<description><![CDATA[thanks for sharing]]></description>
		<content:encoded><![CDATA[<p>thanks for sharing</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: driving directions</title>
		<link>https://www.epanorama.net/blog/2020/03/07/nasty-linux-pppd-vulnerability/comment-page-1/#comment-1685827</link>
		<dc:creator><![CDATA[driving directions]]></dc:creator>
		<pubDate>Mon, 20 Jul 2020 02:28:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185855#comment-1685827</guid>
		<description><![CDATA[I have learned about it and know the difficulty, your information is complete and thanks for sharing]]></description>
		<content:encoded><![CDATA[<p>I have learned about it and know the difficulty, your information is complete and thanks for sharing</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/nasty-linux-pppd-vulnerability/comment-page-1/#comment-1672438</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 09 Mar 2020 08:07:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185855#comment-1672438</guid>
		<description><![CDATA[https://access.redhat.com/security/cve/cve-2020-8597
CVSS v3 Base Score	9.8]]></description>
		<content:encoded><![CDATA[<p><a href="https://access.redhat.com/security/cve/cve-2020-8597" rel="nofollow">https://access.redhat.com/security/cve/cve-2020-8597</a><br />
CVSS v3 Base Score	9.8</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/03/07/nasty-linux-pppd-vulnerability/comment-page-1/#comment-1672370</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 08 Mar 2020 13:30:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=185855#comment-1672370</guid>
		<description><![CDATA[multiple GitHub repositories have been published that may soon host a working PoC. One appears to be a work-in-progress, while another claims that a PoC will be released for this vulnerability “in a week or two when things die down.”
https://www.tenable.com/blog/cve-2020-8597-buffer-overflow-vulnerability-in-point-to-point-protocol-daemon-pppd]]></description>
		<content:encoded><![CDATA[<p>multiple GitHub repositories have been published that may soon host a working PoC. One appears to be a work-in-progress, while another claims that a PoC will be released for this vulnerability “in a week or two when things die down.”<br />
<a href="https://www.tenable.com/blog/cve-2020-8597-buffer-overflow-vulnerability-in-point-to-point-protocol-daemon-pppd" rel="nofollow">https://www.tenable.com/blog/cve-2020-8597-buffer-overflow-vulnerability-in-point-to-point-protocol-daemon-pppd</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
