[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted quagga 0.96.4x-4 (i386 source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 22 Nov 2003 13:27:57 +0100
Source: quagga
Binary: quagga quagga-doc
Architecture: source i386 all
Version: 0.96.4x-4
Distribution: unstable
Urgency: high
Maintainer: Christian Hammers <ch@debian.org>
Changed-By: Christian Hammers <ch@debian.org>
Description: 
 quagga     - Unoff. successor of the Zebra BGP/OSPF/RIP routing daemon
 quagga-doc - Documentation files for quagga
Closes: 220938
Changes: 
 quagga (0.96.4x-4) unstable; urgency=high
 .
   * SECURITY:
     Fixes another bug that was originally reported against Zebra.
     .
     http://rhn.redhat.com/errata/RHSA-2003-307.html
     Herbert Xu reported that Zebra can accept spoofed messages sent on the
     kernel netlink interface by other users on the local machine. This could
     lead to a local denial of service attack. The Common Vulnerabilities and
     Exposures project (cve.mitre.org) has assigned the name CAN-2003-0858 to
     this issue.
 .
   * Minor improvements to init script (thanks to Iustin Pop).
     Closes: #220938
Files: 
 4062a9651692760a729ea5a59385a5dd 679 net optional quagga_0.96.4x-4.dsc
 dfe1e024f6c4919e6605bf6afbb6a028 285071 net optional quagga_0.96.4x-4.diff.gz
 4976e61cba3d7282508afe1b4c645f9a 337642 net optional quagga-doc_0.96.4x-4_all.deb
 fa2bb4d964231c30eb3482f5d84e8477 1627616 net optional quagga_0.96.4x-4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iEYEARECAAYFAj+/au4ACgkQkR9K5oahGObAHQCeJgGwNvgodvytNUIu5pkg+sDg
uOsAn0oMU71A1VDsiiWbUfNCiX3Wp0OG
=xE2W
-----END PGP SIGNATURE-----


Accepted:
quagga-doc_0.96.4x-4_all.deb
  to pool/main/q/quagga/quagga-doc_0.96.4x-4_all.deb
quagga_0.96.4x-4.diff.gz
  to pool/main/q/quagga/quagga_0.96.4x-4.diff.gz
quagga_0.96.4x-4.dsc
  to pool/main/q/quagga/quagga_0.96.4x-4.dsc
quagga_0.96.4x-4_i386.deb
  to pool/main/q/quagga/quagga_0.96.4x-4_i386.deb



Reply to: