<<< Date Index >>>     <<< Thread Index >>>

[SECURITY] [DSA 1787-1] New quagga packages fix denial of service



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1788-1                  security@xxxxxxxxxx
http://www.debian.org/security/                           Florian Weimer
May 04, 2009                          http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : quagga
Vulnerability  : improper assertion
Problem type   : remote
Debian-specific: no
Debian Bug     : 526311

It was discovered that Quagga, an IP routing daemon, could no longer
process the Internet routing table due to broken handling of multiple
4-byte AS numbers in an AS path.  If such a prefix is received, the
BGP daemon crashes with an assert failure, leading to a denial of
service.

The old stable distribution (etch) is not affected by this issue.

For the stable distribution (lenny), this problem has been fixed in
version 0.99.10-1lenny2.

For the unstable distribution (sid), this problem has been fixed in
version 0.99.11-2.

We recommend that you upgrade your quagga package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10.orig.tar.gz
    Size/MD5 checksum:  2424191 c7a2d92e1c42214afef9b2e1cd4b5d06
  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2.diff.gz
    Size/MD5 checksum:    40070 b72e19ed913b32923cf4ef293c67f71c
  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2.dsc
    Size/MD5 checksum:     1651 a8ef80d57fd5a5a5b08c7ccc70e6a179

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.10-1lenny2_all.deb
    Size/MD5 checksum:   661226 720947423143cb35eb5c26a0d420066b

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_alpha.deb
    Size/MD5 checksum:  1902736 570becd04ecb3dd8a0581010884928df

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_amd64.deb
    Size/MD5 checksum:  1748838 f3fcd731d119c422463c36bb4f08be1a

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_arm.deb
    Size/MD5 checksum:  1449222 6b654e2d4e1a4f00169309ebbbd3dbf9

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_hppa.deb
    Size/MD5 checksum:  1681872 8894106d57df0a3d92bb84f148150c2d

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_i386.deb
    Size/MD5 checksum:  1606310 80046937a2da8a949a8167f753a583ce

mipsel architecture (MIPS (Little Endian))

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_mipsel.deb
    Size/MD5 checksum:  1600660 716f61415932929c2f668f99faea448e

powerpc architecture (PowerPC)

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_powerpc.deb
    Size/MD5 checksum:  1715848 995194031d563994b7d77018d8a4ca3e

s390 architecture (IBM S/390)

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_s390.deb
    Size/MD5 checksum:  1794568 b1b47e8dae153461f73c98a61c653e1e

sparc architecture (Sun SPARC/UltraSPARC)

  
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_sparc.deb
    Size/MD5 checksum:  1670342 18f98f0978f510ac18636ca1ccc9dfe7


  These files will probably be moved into the stable distribution on
  its next update.

- 
---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJ/08zAAoJEL97/wQC1SS+0U4H/ArnEIvYBJjOsUJ/nKZ8q/Vw
sAGVI8TJjbrjuE/28vFyiJbT4qb977i9W4lgHiCtpCSaKo3YermLUZ+NSFxP280n
czPtpIcq2lmOwdasq5xueH57cYztP9MdWTKlts79rfDjlK6T5o7dO9bN5iCKsgW9
GCC2ZeJqdY20NTtoSz8OHb9DLljnrvXxPtwv5Z7UPBaHvamvH41oxKLpdE1u274Y
xt5XJ5xiqqxKWxRHNYk0sINTqOiR0eHDIEXwUBM7XOu4GL1CIK7kz4/V+b8H+y+3
g8bxPXFVOcG6KTglwwsUf2utOuFKyrBryXUcwW1ZsF2BGVDuS8LoAaACpuO6mII=
=Eb+C
-----END PGP SIGNATURE-----