-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 02 Oct 2011 01:00:22 +0200 Source: quagga Binary: quagga quagga-doc Architecture: mipsel Version: 0.99.17-2+squeeze3 Distribution: squeeze-security Urgency: high Maintainer: mipsel Build Daemon (eysler) Changed-By: Christian Hammers Description: quagga - BGP/OSPF/RIP routing daemon quagga-doc - documentation files for quagga Changes: quagga (0.99.17-2+squeeze3) stable-security; urgency=high . * SECURITY: This is a backport of the security patches of Quagga 0.99.19 and 0.99.20: - The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing. - The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing. - The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing. Checksums-Sha1: 9ba4df614c6820dd0edff3673f7e89470edfd29e 1588472 quagga_0.99.17-2+squeeze3_mipsel.deb Checksums-Sha256: e546cf97a8fe50849c03286be224ad29a2c5b48c5f6a1e4f4cbea4a3762bd111 1588472 quagga_0.99.17-2+squeeze3_mipsel.deb Files: 559daaa6e3fe79fea7cf91feb3b66342 1588472 net optional quagga_0.99.17-2+squeeze3_mipsel.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJOiHJzAAoJEDSKec327DDYQ/wQAI45EsxNoMriZDFbDwX3tsDS 4TAQfurXtXVOns0eQMXOBvNEpbRffPlTuIP/go4EB/rnMt+J1q8msPeVadc/SUnn Ro0UtgmqF6b2IpBMXpMRCAYh6Chx2jVOphPmbH9/1O26qyaUiKydXMXcCUehUjw0 4PFqy1HlNLadHmT10nLIkWzb5g0ak43fyZ1nlLTYWbVgdIF0+a5yVUPMkxpyjFNP 56LSppMTu6OXdkd3EsTqq2wDpYhEizqYUknqD8Kk/N3hVyWQ6cWwZBbL+UzFtXhn e7vPisDl4PfcQXSpP/P1dSTkOP3Xg9nQXnFybzBY2RVR3mW3Q/RX2XjNSe7DGUDH jkgkxLclPWa5U9Saw4L2b+7VkGuOKVxmZVQtdURqnXX/sKLXdxk/8aqw+7Qnr8fZ LsQVhrEmgkELPEaEgu+SmkBA2fL9XRv3VeKS7pk8ZNHgXrPmP/gUanSIne8jY2AP 1CgSpzDRbY6rjabPhaz8NOn7wyJ3np3rM6Jts3oQHf5vilO6tQJ6anGsK/6FtCtY YxbLOI+cZt8pHW3QfyMCgOrLRyf9pZVlJkrAbTE7asFiG1baAPurIUIg1TB0CHwZ VHf8URJJiTfcyNlHOFxpuda0thZx4wvWkxq4fxJLzVTY0SefDcdvu1dgb9zI3WM+ c2yOPaBDjvBXbF9HlttV =qNEF -----END PGP SIGNATURE-----