-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 02 Oct 2011 01:00:22 +0200 Source: quagga Binary: quagga quagga-doc Architecture: armel Version: 0.99.17-2+squeeze3 Distribution: squeeze-security Urgency: high Maintainer: armel Build Daemon (arnold) Changed-By: Christian Hammers Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.17-2+squeeze3) stable-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: b11e001b1cec43ed20fd8f27da2bbbc8e64b81dc 1591254 quagga_0.99.17-2+squeeze3_armel.deb Checksums-Sha256: 0f9295a7ad452482cbfb26cab3e7b5a165515ec02c2b4bbf55654cb8e86d7d44 1591254 quagga_0.99.17-2+squeeze3_armel.deb Files: 983648a7a9ddbaf718e199e7eb60a3b2 1591254 net optional quagga_0.99.17-2+squeeze3_armel.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJOiEMiAAoJEJvVjrQ+qbowD/8QAKvSRN5r0yrkJrKbFk+EZ37O H7lIlMpcGZcRMI8jQz1QmmlEuk7Gw8Ao8G1qIM3ZXpwdcxymVIX9pLASjUTfQqJI QpkQ5NmrxU44dKyozwmQrPNFlZ4Ah6Gepbvr40TbPyU13RAXPni5SSg7UrNI+SVN +IZPTKYlGCUR011lfAdbiMCznHStUgqj5mXsF0s8UtOipYot/0ZPboEvM2EUtYN1 6w23vJSDMgPvB4l4EWZ10zhIOIg2uLGHqLZLwCv7PYMXbeepqYdhWanloVMYl2GU qPK6bYAlNAfMOmumWHCOASH50ZokP/e/Ez0dYVeImyQD+FHDeuyj4dusmi3AQ65Q wHNCZA1MEUClf3n3RDFjD1bCdPLrsCaDm7d4PnHOKxXrcI+zy0XjFJ2qgiEcnLUN y5dOvYTJ/DREFYqNuoKBbqZnB7S+fiNt2YzY/J9PmdhfbJuNh4OygGBL9TyoB2K/ VWyExPytRQJaTOy/NNitXc1PATsSRlmDueRHwb6fOObM1ugjiUGqAkOK6UzX4tS9 o8uBmVs19GM52Oh4hl6Mly/3DfnwEtHK53jWh4tgXUtc8vfoUTmYXIokdc/u6/U9 vRQc0V27ggSGA2nVML5QKXsqi9tr2BieGoKzUwuXCgHSXcJjAIz+NvKTVTF48cMs 6qITf3NyiI9iOOo/f9VX =+hml -----END PGP SIGNATURE-----