-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 02 Oct 2011 01:00:22 +0200 Source: quagga Binary: quagga quagga-doc Architecture: sparc Version: 0.99.17-2+squeeze3 Distribution: squeeze-security Urgency: high Maintainer: sparc Build Daemon (schroeder) Changed-By: Christian Hammers Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.17-2+squeeze3) stable-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 346895a1d58a0ce3e6977d6f37b21cc1d390ffdc 1689910 quagga_0.99.17-2+squeeze3_sparc.deb Checksums-Sha256: 9747152a8d54ff9a78129051cd32ba26355276e89d1e6ca683d1b4d763682818 1689910 quagga_0.99.17-2+squeeze3_sparc.deb Files: 0a312703c1655f56f570b31526178cbc 1689910 net optional quagga_0.99.17-2+squeeze3_sparc.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJOiFDeAAoJEFDt1Ed8OSsYEdEQAMKeI/MLYEEKtkEPn/4d43cA KEQrxk+/qVuRaC5nDHaDOIk2NenMgfF+SzsONB094x5TAqjG0vGNmq96h5OtnwRu M+0JyLC84hiadDN48iGRLFNploCtzGyQ5wqsVvsgTqo0N8KtaufEkYUwP3Wnsdvf eWOL41jWo06xQVS5sRzEKuIgZmtrgcxQ61fe3cBe8246nWRJBof2PGlYD8xaCT+I ytj87UyYuvuquaVblLBPj3TeyOKb01PHRKcnWBnhEkaouo+bPmEzVg/4cnDibhyD qg4NtRi7nZ/x/INe++OAsvUBWFbAdoByvBlxGG2whKwgSEN4i0qXgv5gna/4GsLT hsGwp9nzGi2VuSjZw6fuyY3YBLg1AplA7bjGdewOBDUNvtrNojG5+1o2nLljafpi V0cvlJmdmBWD1WkVdG6lr/bHWvd6Cg09x9ZSmTZZqG+BDYrGnO52/8OYOfERuvkA UyrW9S52C06i8iwlpHN8vGWmlbZmLiJ/niFlqNJl3eHegtxZ7prLDpwaWLECjgLd 2g+kyjAPPfZkvtS0w/2BlnMHDUvaaDqocQyFzuA6+BDxVxTzK0EwWlAT550nWBH6 t2CCTOL3oBcUNJ1wJULgnKm7jSUBaTBB9M6IDIZHXr4fNZp/lPdWM1Ko4/Y9xzpO JV5WLoavVMSg9ecwsrZT =K8wt -----END PGP SIGNATURE-----