Accepted quagga 0.96.4x-4 (i386 source all)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sat, 22 Nov 2003 13:27:57 +0100
Source: quagga
Binary: quagga quagga-doc
Architecture: source i386 all
Version: 0.96.4x-4
Distribution: unstable
Urgency: high
Maintainer: Christian Hammers <ch@debian.org>
Changed-By: Christian Hammers <ch@debian.org>
Description:
quagga - Unoff. successor of the Zebra BGP/OSPF/RIP routing daemon
quagga-doc - Documentation files for quagga
Closes: 220938
Changes:
quagga (0.96.4x-4) unstable; urgency=high
.
* SECURITY:
Fixes another bug that was originally reported against Zebra.
.
http://rhn.redhat.com/errata/RHSA-2003-307.html
Herbert Xu reported that Zebra can accept spoofed messages sent on the
kernel netlink interface by other users on the local machine. This could
lead to a local denial of service attack. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2003-0858 to
this issue.
.
* Minor improvements to init script (thanks to Iustin Pop).
Closes: #220938
Files:
4062a9651692760a729ea5a59385a5dd 679 net optional quagga_0.96.4x-4.dsc
dfe1e024f6c4919e6605bf6afbb6a028 285071 net optional quagga_0.96.4x-4.diff.gz
4976e61cba3d7282508afe1b4c645f9a 337642 net optional quagga-doc_0.96.4x-4_all.deb
fa2bb4d964231c30eb3482f5d84e8477 1627616 net optional quagga_0.96.4x-4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iEYEARECAAYFAj+/au4ACgkQkR9K5oahGObAHQCeJgGwNvgodvytNUIu5pkg+sDg
uOsAn0oMU71A1VDsiiWbUfNCiX3Wp0OG
=xE2W
-----END PGP SIGNATURE-----
Accepted:
quagga-doc_0.96.4x-4_all.deb
to pool/main/q/quagga/quagga-doc_0.96.4x-4_all.deb
quagga_0.96.4x-4.diff.gz
to pool/main/q/quagga/quagga_0.96.4x-4.diff.gz
quagga_0.96.4x-4.dsc
to pool/main/q/quagga/quagga_0.96.4x-4.dsc
quagga_0.96.4x-4_i386.deb
to pool/main/q/quagga/quagga_0.96.4x-4_i386.deb
Reply to: