RHN Errata Alert: Updated ppp packages available
Red Hat Network has determined that the following advisory is applicable to one or more of the systems you have registered:
Complete information about this errata can be found at the following location:
  https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1066
Bug Fix Advisory - RHBA-2002:037-04
RHN Errata Alert: Updated ppp packages available
Summary:
  Updated ppp packages available
Updated ppp packages are available for Red Hat Linux 7.2. These updates fix a bug which hampered interoperability with other PPP implementations.
Description:
  The version of pppd included in Red Hat Linux 7.2 incorrectly advertised support   for CBCP. If a peer attempted to configure use of this protocol, the LCP negotiation   and the connection attempt would fail.
  ------------------------------------------------------------------------------
-------------
  Taking Action
  -------------
  You may address the issues outlined in this advisory in two ways:
 - select your server name by clicking on its name from the list
  available at the following location, and then schedule an
  errata update for it:
  https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.
  ---------------------------------
  Changing Notification Preferences
  ---------------------------------
  To enable/disable your Errata Alert preferences globally please log in to RHN   and navigate from "Your RHN" / "Your Account" to the "Preferences"   tab.
URL: https://rhn.redhat.com/network/my_account/my_prefs.pxt
You can also enable/disable notification on a per system basis by selecting an individual system from the "Systems List". From the individual system view click the "Details" tab.
  ---------------------
  Affected Systems List
  ---------------------
  This Errata Advisory may apply to the systems listed below. If you know that   this errata does not apply to a system listed, it might be possible that the   package profile for that server is out of date. In that case you should run   'up2date -p' as root on the system in question to refresh your software profile.