-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 02 Oct 2011 14:28:25 +0200 Source: quagga Binary: quagga quagga-doc Architecture: arm Version: 0.99.10-1lenny6 Distribution: lenny-security Urgency: high Maintainer: arm Build Daemon (toffee) Changed-By: Florian Weimer Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.10-1lenny6) lenny-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 266922b83d83aaebd9b5362167ff02755373d759 1450424 quagga_0.99.10-1lenny6_arm.deb Checksums-Sha256: 331a9f89efd4222276d65ecd4cc6ab8ecb120f139c5f1b43f8cd1215c26b1ad6 1450424 quagga_0.99.10-1lenny6_arm.deb Files: a06c15a15faed2c2e3c4b8abc89310e4 1450424 net optional quagga_0.99.10-1lenny6_arm.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJOjKtsAAoJEL97/wQC1SS+kpAIAIwJ5STT93vF/12Z/GjWOlQY Fz9eRm7264cYBDkt59mdZ+hwTorWR1GQOFVGZhapUgx6+e5aBzhG1B/pznJHWgQ3 M8s5PnOzeIucdHNgCRgZUwquQn15285g8k8bojmUfuwbTAniRYteP56tdZyQ3ISQ I3TslC8Z0R+j1buRODPS/6+5ugbZaIACjGDLgwMSSr1+2AX9vco/5yjXWD4mNHrU PVDd/20281fLIsZhUpl/Xwl6tU9cbiwqvPMYf8CFS0n5GnoIqao93gWuAq8nUJCQ LoNg5dFKdcRMlSBanRMVVD9XLMmPgrc/Wzg5cUFn1y8PMXpB7AGmTG0bsmGT8w4= =a3Dh -----END PGP SIGNATURE-----