Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in quagga
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in quagga
ID: FEDORA-2011-13492
Distribution: Fedora
Plattformen: Fedora 16
Datum: Mi, 19. Oktober 2011, 08:15
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3323
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3324
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3325
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3327
Applikationen: quagga

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2011-13492
2011-09-29 17:10:19
-------------------------------------------------------------------------------
-

Name : quagga
Product : Fedora 16
Version : 0.99.20
Release : 2.fc16
URL : http://www.quagga.net
Summary : Routing daemon
Description :
Quagga is a free software that manages TCP/IP based routing
protocol. It takes multi-server and multi-thread approach to resolve
the current complexity of the Internet.

Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.

Quagga is intended to be used as a Route Server and a Route Reflector. It is
not a toolkit, it provides full routing power under a new architecture.
Quagga by design has a process for each protocol.

Quagga is a fork of GNU Zebra.

-------------------------------------------------------------------------------
-
Update Information:

fixes CVE-2011-332{3..7}
update to latest upstream 0.99.20
fixes memory leak
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #738393 - CVE-2011-3323 Quagga (ospf6d): Stack-based buffer
overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA
https://bugzilla.redhat.com/show_bug.cgi?id=738393
[ 2 ] Bug #738394 - CVE-2011-3324 Quagga (ospf6d): Denial of service by
decoding malformed Database Description packet headers
https://bugzilla.redhat.com/show_bug.cgi?id=738394
[ 3 ] Bug #738396 - CVE-2011-3325 Quagga (ospfd): Denial of service by
decoding too short Hello packet or Hello packet with invalid OSPFv2 header type
https://bugzilla.redhat.com/show_bug.cgi?id=738396
[ 4 ] Bug #738398 - CVE-2011-3326 Quagga (ospfd): Denial of service by
decoding Link State Update LSAs of unknown type
https://bugzilla.redhat.com/show_bug.cgi?id=738398
[ 5 ] Bug #738400 - CVE-2011-3327 Quagga (bgpd): Heap-based buffer overflow
by decoding BGP UPDATE message with unknown AS_PATH attributes
https://bugzilla.redhat.com/show_bug.cgi?id=738400
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update quagga' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung