-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 02 Oct 2011 01:00:22 +0200 Source: quagga Binary: quagga quagga-doc Architecture: powerpc Version: 0.99.17-2+squeeze3 Distribution: squeeze-security Urgency: high Maintainer: powerpc Build Daemon (poulenc) Changed-By: Christian Hammers Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.17-2+squeeze3) stable-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 02b9609ab5b71d29de9f5e9051e516e682d1d4f8 1658572 quagga_0.99.17-2+squeeze3_powerpc.deb Checksums-Sha256: 27fc2318e6d9b797116e987fef29a141141a03a2ebaf6cb988a29b886304a196 1658572 quagga_0.99.17-2+squeeze3_powerpc.deb Files: 23419b865f5561d8f6f9f9115d7100f5 1658572 net optional quagga_0.99.17-2+squeeze3_powerpc.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJOiDvSAAoJENaFIRh3nh3WtAsP/RxLFtmEgE4vE/DA4+iEu72s rTzl0SBq+4Z6D1BEybBwO5lfF076AWDEpiKuJ2F70Is5pHLb2mgWX6QdUI71vtP0 H/FVVT561qkGOo/neey+1FRg7xJ42y21L/amqVgbi601TfpndoshIUtsl7qBCUm9 SdbSAOtEKXWMd+JReF9NmF9g/Jsk00iaQNVuugF39Y0o/5HyHmhDv48IBDwydFh4 jbs0N6meqYP7Dd6vzDJwTcujUQN13/jNYuMLbFc9IjxxqxpmKUo1KjH7eKgU5iUw 60e2t1av8SeoWU/v+VZVQMMXiy3HJ2LeWU1h/tPCjW6+Mcyl7FnwvBtXa+L8KZe0 VxYSMOSLlz5XdGcsF6JoAPM/ZrW45FPQdPzzr9nXaQwFfb8ETXwpBS4xR5s4iEdq 08scArxA2qUpV/ox9qK0EZGF3qX6iILoCEkU/+PsjESwvTzBcKngNeXbWpfF+XhV EbM0qFHx2sRFMos/QF4qu6ZfiB8uQPRATZnTuc9Ha8WiCDdUVjo39fUJ/85RN1c7 xpWxALg93ByL9zucwoIRB0fPbRkkigfip90ir3SqD7QDeutH9Nrh/FfpWVFS0/Hb DaoFFnBTb3PumE84Nj8KH3TfxuHfe0l7HYqLR/KjoqbAV9kT6vuG8s1ja98QiRfH wblvBeslBclctf2RPJkD =/Z6H -----END PGP SIGNATURE-----