-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 27 Oct 2013 23:38:09 +0100 Source: quagga Binary: quagga quagga-dbg quagga-doc Architecture: mipsel Version: 0.99.21-4+wheezy2 Distribution: wheezy-security Urgency: high Maintainer: mipsel Build Daemon (rem) Changed-By: Christian Hammers Description: quagga - BGP/OSPF/RIP routing daemon quagga-dbg - BGP/OSPF/RIP routing daemon (debug symbols) quagga-doc - documentation files for quagga Closes: 726724 Changes: quagga (0.99.21-4+wheezy2) stable-security; urgency=high . * Applied a patch that fixes the following security issue: "ospfd: CVE-2013-2236, stack overrun in apiserver . the OSPF API-server (exporting the LSDB and allowing announcement of Opaque-LSAs) writes past the end of fixed on-stack buffers. This leads to an exploitable stack overflow. . For this condition to occur, the following two conditions must be true: - Quagga is configured with --enable-opaque-lsa - ospfd is started with the "-a" command line option" Closes: #726724 Checksums-Sha1: 6a4eb43e451d676c4e546eeeb294b12203632bcc 1628536 quagga_0.99.21-4+wheezy2_mipsel.deb 1d1dd9b479ddf7824607d824e0ca90304062d5ac 1881866 quagga-dbg_0.99.21-4+wheezy2_mipsel.deb Checksums-Sha256: c1009c4282c5fce2c70aa1cd1cf43bf5a383d79efc2bef038eded0496ef991ad 1628536 quagga_0.99.21-4+wheezy2_mipsel.deb 0c5a211026873be6d497eba722e14a3628e90824243219aeee8bb0ff9b1c8b93 1881866 quagga-dbg_0.99.21-4+wheezy2_mipsel.deb Files: b96d05642d5b46e945f99eea99991ca6 1628536 net optional quagga_0.99.21-4+wheezy2_mipsel.deb 04da9ffad96991332bc3f5e860bc66a8 1881866 debug extra quagga-dbg_0.99.21-4+wheezy2_mipsel.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJSgW0AAAoJEA8ok0ex3+ashsMQAJPWUSK8e+7/GLpVxypGxpAf BVE12DfDFDgAUAPmGR/kMGJzlno3Er+2WduHwYJ0iWpJOCQ4LFUzWtQt+9vNkv3q u9+rbxHa66YrOoFl/xW9SjoAWVv8MCCWkJng4Gr4gCRSVV3ad/WrKNfW7ntkPF4w NdNMlvPY8x9t0knmIbcd99jK8Hi+9EiCnwp60EdG6egEshI89HW2EdDUx6ib6PKZ FRMk1jnqvInWP51XjubTc+4MHWS+DLt4sMrfVF85yZhdVVd3BsHxerkIiHVMgJnB eBMmFhlQPyiPe8i5LO6db2iVj9wHZ99GmwERBlWSmoE+vvwJlTS+MAChR6FbC4+J V2xUyo+oyEXKz3xTCf/6gCfi+Dwhx38aLfVSCFE0IK2NiptUSfGbDOKipODemi6G nLPr341tvJiYeFtXKnB/i05PBMhqrXPNwV/BZ0wzcyYm3/kRT6F+wtzWL3MGTVfX zjJQCBF7OCSXZJTLwk4T7q/raeGzahMPMVDGxv2fgi1VDoDRMQvPAR/lKbUpzAmb W7Ip/be8SeDVreH8SEcFpuazHiavH0ScERnQvJKdPYRqs9JceyYcOeDjRXoXWhHC M+incOF5hQyUsAhmuppqQN74KSFfGvHJqTQ1mZYGms2YZ/BbT6owO04SO775CxJk 8cRpx5A3pZT+ymUZGRth =Vzk4 -----END PGP SIGNATURE-----