-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 02 Oct 2011 14:28:25 +0200 Source: quagga Binary: quagga quagga-doc Architecture: ia64 Version: 0.99.10-1lenny6 Distribution: lenny-security Urgency: high Maintainer: ia64 Build Daemon (alkman) Changed-By: Florian Weimer Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.10-1lenny6) lenny-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 356ddb1c6bb4a304136e9bf7f506496728b3fef6 2256180 quagga_0.99.10-1lenny6_ia64.deb Checksums-Sha256: 2cdbd2510a3cd64e8c6eba16ddea952199aed17996ee128023960b71aca31533 2256180 quagga_0.99.10-1lenny6_ia64.deb Files: 7ab59d7740ee204a5777bcf1ef767911 2256180 net optional quagga_0.99.10-1lenny6_ia64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJOi3/TAAoJEA/jH0XGWRzp/ZwP/i1CpsPll3Ci2KZvy0GvcyPn KrddVS8FYD6ZG3XCZkoGKpTpFBKPqLV4izsTfxiQpsH488LnLYF1t4tTwcW8Z3ev WoLvoDn68ocPT+jd5iQVVh8CGhc4gE6LfYXYJUoffqbsYu6FavdbMdNBw+ez+zGS g1WLnLY0fZg1TilkSoYGRTcMcGrkUIsEaSCFZuu2lBJ8LlcVfS7cdiaHh88jMPNb sdbAx0S0uURb89MvgQqnHtJpfWNnQpNAm98nQY7BhbgZXOiGWbG6srRhMgjEA/5H MCOVrofx5VDipc2o5MEHxaCNiGOcpkGKEvzKQlS490DzxhXjwl+nEM3HJx3B2OB7 tQmi7cn47/hs3sLCZqVrr26o0s4TMKUkfaf29sov/QgNNB06CJq2jOlGElGPLmYj UNSOH3tv9BPtKMz2iypZ/Mruoe+HZBgR1LVUwaokodroW0fTCMsrhcb3gFcJpXya 07VMsgPmpFlQM7txpFHpGpwwAy6OyhJ3M3LeMiaZC1Q1M88BlK4UDU+ojuGfKWyN HkrooI9vaogxIBiOkUaErNhWj4oYsOQC36LuPL4s3NpoM4XQyxRePGDVWtEekKMD inUB5JPYG85WBGHuSJM2YAUE1otUutLH9g+6diNf5j2Pe+rzgh3OPJbsKx5dt1bb ABgoHnMuyVvWVedk27de =q3Eb -----END PGP SIGNATURE-----