drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in quagga
Name: |
Mehrere Probleme in quagga |
|
ID: |
FEDORA-2012-5436 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 15 |
|
Datum: |
So, 22. April 2012, 10:20 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0249
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0250
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0255 |
|
Applikationen: |
quagga |
|
Originalnachricht |
Name : quagga Product : Fedora 15 Version : 0.99.20.1 Release : 1.fc15 URL : http://www.quagga.net Summary : Routing daemon Description : Quagga is a free software that manages TCP/IP based routing protocol. It takes multi-server and multi-thread approach to resolve the current complexity of the Internet.
Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.
Quagga is intended to be used as a Route Server and a Route Reflector. It is not a toolkit, it provides full routing power under a new architecture. Quagga by design has a process for each protocol.
Quagga is a fork of GNU Zebra.
------------------------------------------------------------------------------- - Update Information:
fixes CVEs, updates to latest upstream quagga-0.99.20.1 ------------------------------------------------------------------------------- - ChangeLog:
* Thu Mar 15 2012 Jiri Skala <jskala@redhat.com> - 0.99.20.1-1 - updated to latest upstream version 0.99.20.1 * Tue Oct 18 2011 Jiri Skala <jskala@redhat.com> - 0.99.20-2 - fixes #746886 - severe memory leak in quagga 0.99.{19,20} * Fri Sep 30 2011 Jiri Skala <jskala@redhat.com> - 0.99.20-1 - updated to latest upstream version 0.99.20 - fixes #741343 - CVE-2011-3325 corrected fix * Thu Sep 29 2011 Jiri Skala <jskala@redhat.com> - 0.99.19-1 - fixes #741343 - CVE-2011-3323 CVE-2011-3324 CVE-2011-3325 CVE-2011-3326 CVE-2011-3327 - fixes #741580 - updated to latest upstream version 0.99.19 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #802827 - CVE-2012-0249 quagga (ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet https://bugzilla.redhat.com/show_bug.cgi?id=802827 [ 2 ] Bug #802829 - CVE-2012-0250 quagga (ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures https://bugzilla.redhat.com/show_bug.cgi?id=802829 [ 3 ] Bug #802781 - CVE-2012-0255 quagga (bgpd): Assertion failure by processing malformed AS4 capability in BGP OPEN message https://bugzilla.redhat.com/show_bug.cgi?id=802781 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update quagga' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|