-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 02 Oct 2011 14:28:25 +0200 Source: quagga Binary: quagga quagga-doc Architecture: powerpc Version: 0.99.10-1lenny6 Distribution: lenny-security Urgency: high Maintainer: powerpc Build Daemon (poulenc) Changed-By: Florian Weimer Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.10-1lenny6) lenny-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 10fa20e35c14b5b884709fc4c46b82244724569b 1716766 quagga_0.99.10-1lenny6_powerpc.deb Checksums-Sha256: 868d1fbbeb05f9e3c095c95adb24f249a74caccbcda397b11338f3cd550fc2b4 1716766 quagga_0.99.10-1lenny6_powerpc.deb Files: 4df9f9f021c67ee683b313fd6a6adbd1 1716766 net optional quagga_0.99.10-1lenny6_powerpc.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJOi2u8AAoJENaFIRh3nh3WnMEP/A/K1Dvqm4BPvJMvbCkFXJQ7 jOxkuyM+ioBusJyzw3aIyAdkvA0Z5/QSWogfCt0H+WOolA8eC9nvOKagIHxlcsxS o4GzrsHee4Nk3LhaMGmmQi+nnwXVuP/2ymJ+kUIOhQqFzeJ8avq/qCeZy0zOJZU8 Lo1pLKhW9+E3YYaqQ6sBl+2pA+ZrjToOdLprx75JHEnZ0kbRvQ5hiiRJNxABdtDV BD8b9kniqPoQcizdzuOH+dJivYJIboiUuyMRytvd30vBs1Qka/nWAFkZ4bTrkgGW xb4Runs6TttbKB6hwP0FhXIBSaHDmhD6PDHtpwOjuZrQ4nkIKC3eg2p6Hf2JTVqs YMB5ZOJ3xrGjRYZninOAPTz/9yOKVLesLsa273MpqTcEBdey3i8cFwzNyCX20sTr KLokdoVGtx7yzmsxIgi+PQ0IsjiSAb5jARErITo5TyVEFXUuiZKbOQWIfuO8hljS EySX+BlfA1G959tz2Xpgr8GcVQE79Inqwe7MZrXnnuwnxg4yr3ntcZINAwy6sFL3 tkFZPNLw2ogikiG5fS79j/P2sTYxwfgOLUXwIxArd6bRJ4D+2bDs/DiIWUcUpkwx F5k0b2GHVwqGoD1gXCrsEl08GPZQDxMPKiPjX+HdACaM0j+wS3MTwwcD4Nb7GfYS +4RcZqTcvyclBzXGoXuf =h/+v -----END PGP SIGNATURE-----