-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 02 Oct 2011 01:00:22 +0200 Source: quagga Binary: quagga quagga-doc Architecture: s390 Version: 0.99.17-2+squeeze3 Distribution: squeeze-security Urgency: high Maintainer: s390 Build Daemon (zandonai) Changed-By: Christian Hammers Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.17-2+squeeze3) stable-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 0e26d3a5eec381e4b92e3884a54a3fcd824aaac6 1757078 quagga_0.99.17-2+squeeze3_s390.deb Checksums-Sha256: b64b7995b52b7220c3b874db3891253c2ae31dd909dabd05201d61dc2ea3165b 1757078 quagga_0.99.17-2+squeeze3_s390.deb Files: c5eb2da10fb99bf3ec53888ab3113741 1757078 net optional quagga_0.99.17-2+squeeze3_s390.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJOiLsrAAoJEPaODSItlB0m670P/0r5XneGzX0Ip7Yi4uIaBrvf 2PwoDcH1LYgiCRWKO5stPAf+n5120MD6nwP3xPEYSYercsqonfceqxmpo536Yi+Q htkT2ZPgTLtCMHwKigNgSYRaTqOE8is8GnhbqwsOTMlZgVsEi9N7Jr3sdv/mv9hj QxAYQz/ADWNykaQMsihmV2MoYJxhviqpOnJ+8MRvNAwmS7L16I0cErKCSLsXXMfs knGU/gcimYkXFeulpW7ZCSulDIhT5Qwg/P2DCkHuKZMjUL+8pYhPyGN89ikfL7Il lKxEQrN+D4TC0LP/UX2AFAjkNlkJZV8d01aZFXxVFfDCAGEcsSFA6Q51u0m2fKfM 7kP3UNbTMMyxBk30W0kfsReoxq8eDOEqnSrbbkWePJWUQGJx8GqvkixrdmZhKsTx 4Wd0ftOH8COcsaPCG0TsfrzkwrsOMpgAY4fqtdZFBRJ7ngq7fwBGd5ofWlqRbDRD dZAAtahbddMoRwo3ghqG6SadFvORfYyTp0ig00RNm4HhsdKiMsmkUw/q0CDsnxwh fFLfkT1pV73tV1R5glMWX0BHx7m55kNG8y3jrlFNVqQmZei3C2jtop/9GydE1wcf +qhbZlw3tkla+WzRzdLEt52z/C743S0uz96pE+By043AFB4T6jAIGF8EVgN9CU0W NNTnf9IfModa+pgTzHzy =uxGt -----END PGP SIGNATURE-----