-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 02 Oct 2011 01:00:22 +0200 Source: quagga Binary: quagga quagga-doc Architecture: mips Version: 0.99.17-2+squeeze3 Distribution: squeeze-security Urgency: high Maintainer: mips Build Daemon (corelli) Changed-By: Christian Hammers Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.17-2+squeeze3) stable-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 3045f4a934f0abd771166e205fef5132fcee7f25 1594002 quagga_0.99.17-2+squeeze3_mips.deb Checksums-Sha256: 7874e5dc961245c2153d1785cd6a0073b2d7df9db54e040c8c2f7044acfd36ec 1594002 quagga_0.99.17-2+squeeze3_mips.deb Files: 22c1da0d0b6d0416facdd9030774b43b 1594002 net optional quagga_0.99.17-2+squeeze3_mips.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQIcBAEBAgAGBQJOiFDpAAoJELcyWGdNnMAm1rgP/19asAmc7UcrnURod//ThDvw sFOb6SFZjrS4X9GmqbaN/pP5lkPfowMUcJummyGQxb3U2OaBznLAtCddU3JsyAuC XrYCTkij42AN5kGZw9sjG7r55TNu7tMjnsFSRW8rYCKnfCLvuQawbk2DYKdYWrmz 9X4aYWxXogulasIb3RZvH7I97jaiV8vtV2xoh9jttk5k8lBIQ69ix0dSjcrOUPhh N5DbH9QonL4+VAfzmsa7gz9RorCc32cSojQbpwHlgUM21EGpibxivD3CJpoZCHsQ igycnVyHmoFBirpyoSLaeLxfUQ1ogE4SKfkphSrjvtsbTs7URSKfyjDQySncjmf1 JvXfJ6lC4OtzNxubUEiujJ2uK8dlRxhfyBgkdJznbbZgpEfFsRkHPxy1d/F9szeV BQVITySRPaPhTwEs7Ex3N7IhjGm7tiZooGVoSz/Vqf4KvH37J8o/CWdUbN0R1l8t HnVas2H8XkymjT/BeYLp2x8Mb9nC9Gxl5JvzA/FtW6Dkwup7OaahpfDOj1+c/V94 rOL+g4YhHElT8ELf0Jy3EcwxvTQ2lKHZhsFQFaUnJgm/IfSR54d0xT2xOqe0+UaI XYRzZWEZ4OU9Az2dQjAnIWyVT+sHnLoCN7onPoZYl4zZcLnj0vaVL//WQuNEXEma pRAqJY2YXb/Hm5KQluK9 =t7b5 -----END PGP SIGNATURE-----